CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
91.2%
The Keccak sponge function interface accepts partial inputs to be absorbed and partial outputs to be squeezed. A buffer can overflow when partial data with some specific sizes are queued, where at least one of them has a length of 2^32 - 200 bytes or more.
Yes, see commit fdc6fef0.
The problem can be avoided by limiting the size of the partial input data (or partial output digest) below 2^32 - 200 bytes. Multiple calls to the queue system can be chained at a higher level to retain the original functionality. Alternatively, one can process the entire input (or produce the entire output) at once, avoiding the queuing functions altogether.
See issue #105 for more details.
csrc.nist.gov/projects/hash-functions/sha-3-project
eprint.iacr.org/2023/331
github.com/advisories/GHSA-6w4m-2xhg-2658
github.com/johanns/sha3/commit/5f2e8118a62831911703c8753ff2435c3b5d7312
github.com/johanns/sha3/issues/17
github.com/rubysec/ruby-advisory-db/blob/master/gems/sha3/CVE-2022-37454.yml
github.com/tiran/pysha3/issues/29
github.com/XKCP/XKCP/commit/fdc6fef075f4e81d6b1bc38364248975e08e340a
github.com/XKCP/XKCP/issues/105
github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658
lists.debian.org/debian-lts-announce/2022/10/msg00041.html
lists.debian.org/debian-lts-announce/2022/11/msg00000.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ALQ6BDDPX5HU5YBQOBMDVAA2TSGDKIJ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMIEXLMTW5GO36HTFFWIPB3OHZXCT3G4/
lists.fedoraproject.org/archives/list/[email protected]/message/3ALQ6BDDPX5HU5YBQOBMDVAA2TSGDKIJ/
lists.fedoraproject.org/archives/list/[email protected]/message/CMIEXLMTW5GO36HTFFWIPB3OHZXCT3G4/
mouha.be/sha-3-buffer-overflow/
news.ycombinator.com/item?id=33281106
news.ycombinator.com/item?id=35050307
nvd.nist.gov/vuln/detail/CVE-2022-37454
security.gentoo.org/glsa/202305-02
www.debian.org/security/2022/dsa-5267
www.debian.org/security/2022/dsa-5269