A buffer overflow in the component /Enclave.cpp of Electronics and Telecommunications Research Institute ShieldStore commit 58d455617f99705f0ffd8a27616abdf77bdc1bdc allows attackers to cause an information leak via a crafted structure from an untrusted operating system.
References
| Link | Resource |
|---|---|
| http://electronics.com | Broken Link |
| http://shieldstore.com | Broken Link |
| https://github.com/cocoppang/ShieldStore/blob/master/Enclave/Enclave.cpp | Patch |
| https://github.com/cocoppang/ShieldStore/issues/19 | Exploit Issue Tracking |
| http://electronics.com | Broken Link |
| http://shieldstore.com | Broken Link |
| https://github.com/cocoppang/ShieldStore/blob/master/Enclave/Enclave.cpp | Patch |
| https://github.com/cocoppang/ShieldStore/issues/19 | Exploit Issue Tracking |
| https://github.com/cocoppang/ShieldStore/issues/19 | Exploit Issue Tracking |
Configurations
History
29 Jan 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/cocoppang/ShieldStore/issues/19 - Exploit, Issue Tracking |
Information
Published : 2023-05-09 03:15
Updated : 2025-01-29 15:15
NVD link : CVE-2021-44283
Mitre link : CVE-2021-44283
CVE.ORG link : CVE-2021-44283
JSON object : View
Products Affected
shieldstore_project
- shieldstore
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
