High severity7.8NVD Advisory· Published Nov 16, 2017· Updated May 13, 2026
CVE-2017-16837
CVE-2017-16837
Description
Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.
Affected products
1- cpe:2.3:a:trusted_boot_project:trusted_boot:1.9.6:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- sourceforge.net/p/tboot/code/ci/521c58e51eb5be105a29983742850e72c44ed80e/nvdIssue TrackingPatchThird Party Advisory
- www.usenix.org/conference/usenixsecurity18/presentation/hannvd
News mentions
0No linked articles in our index yet.