Lucene search

K
alpinelinuxAlpine Linux Development TeamALPINE:CVE-2024-5288
HistoryAug 27, 2024 - 7:15 p.m.

CVE-2024-5288

2024-08-2719:15:17
Alpine Linux Development Team
security.alpinelinux.org
2
wolfssl
ecdsa
key disclosure
rowhammer
fault probe
server-side tls

CVSS3

5.1

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

9.5%

An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys,

such as in server-side TLS connections, the connection is halted if any fault occurs.Β The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.

OSVersionArchitecturePackageVersionFilename
Alpineedge-communitynoarchwolfssl=Β 5.7.0-r0UNKNOWN
Alpine3.20-communitynoarchwolfssl=Β 5.7.0-r0UNKNOWN

CVSS3

5.1

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

9.5%