Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-37305
HistoryJun 17, 2024 - 7:42 p.m.

CVE-2024-37305 Buffer overflow in deserialization in oqs-provider

2024-06-1719:42:22
CWE-130
CWE-190
CWE-120
CWE-680
CWE-805
GitHub_M
www.cve.org
1
cve-2024-37305
buffer overflow
deserialization
oqs-provider
openssl 3
post-quantum cryptography
flaws
decode_uint32
hybrid keys
signatures
information leakage
memory reads
memory writes
patch
upgrade

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

0.0004 Low

EPSS

Percentile

9.1%

oqs-provider is a provider for the OpenSSL 3 cryptography library that adds support for post-quantum cryptography in TLS, X.509, and S/MIME using post-quantum algorithms from liboqs. Flaws have been identified in the way oqs-provider handles lengths decoded with DECODE_UINT32 at the start of serialized hybrid (traditional + post-quantum) keys and signatures. Unchecked length values are later used for memory reads and writes; malformed input can lead to crashes or information leakage. Handling of plain/non-hybrid PQ key operation is not affected. This issue has been patched in in v0.6.1. All users are advised to upgrade. There are no workarounds for this issue.

CNA Affected

[
  {
    "vendor": "open-quantum-safe",
    "product": "oqs-provider",
    "versions": [
      {
        "version": "< 0.6.1",
        "status": "affected"
      }
    ]
  }
]

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

0.0004 Low

EPSS

Percentile

9.1%

Related for CVELIST:CVE-2024-37305