You are here |
www.elttam.com.au | ||
| | | |
www.elttam.com
|
|
| | | | elttam is a globally recognised, independent information security company, renowned for our advanced technical security assessments. | |
| | | |
aboulton.blogspot.com
|
|
| | | | From time to time, I get an opportunity to do some independent research. Something that has always particularly peaked my interest is Lotus ... | |
| | | |
www.elttam.com
|
|
| | | | elttam is a globally recognised, independent information security company, renowned for our advanced technical security assessments. | |
| | | |
blog.quarkslab.com
|
|
| | In this blog post we discuss the details of two vulnerabilities we discovered in the Trusted Platform Module (TPM) 2.0 reference implementation code. These two vulnerabilities, an out-of-bounds write (CVE-2023-1017) and an out-of-bounds read (CVE-2023-1018), affected several TPM 2.0 software implementations (such as the ones used by virtualization software) as well as a number of hardware TPMs. |