[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2021-20305Date: (C)2021-04-06   (M)2024-01-26


A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.1CVSS Score : 6.8
Exploit Score: 2.2Exploit Score: 8.6
Impact Score: 5.9Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
DSA-4933
FEDORA-2021-454a0f6f76
GLSA-202105-31
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://bugzilla.redhat.com/show_bug.cgi?id=1942533
https://security.netapp.com/advisory/ntap-20211022-0002/

CPE    2
cpe:/o:debian:debian_linux:9.0
cpe:/o:redhat:enterprise_linux:7.0
CWE    1
CWE-787
OVAL    18
oval:org.secpod.oval:def:2500405
oval:org.secpod.oval:def:71586
oval:org.secpod.oval:def:73662
oval:org.secpod.oval:def:1700609
...

© SecPod Technologies