CVE-2015-8803
Publication date 31 December 2015
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.
Status
Package | Ubuntu Release | Status |
---|---|---|
nettle | ||
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Fixed 2.7.1-1ubuntu0.1
|
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 · Critical |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-2897-1
- Nettle vulnerabilities
- 15 February 2016
Other references
- https://lists.lysator.liu.se/pipermail/nettle-bugs/2015/003028.html
- http://seclists.org/oss-sec/2016/q1/273
- https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html
- https://lists.gnu.org/archive/html/info-gnu/2016-01/msg00006.html
- https://www.cve.org/CVERecord?id=CVE-2015-8803