Lucene search

K
githubGitHub Advisory DatabaseGHSA-F6HC-9G49-XMX7
HistoryMar 01, 2023 - 10:36 p.m.

nistec has Incorrect Calculation in Multiplication of unreduced P-256 scalars

2023-03-0122:36:36
CWE-682
GitHub Advisory Database
github.com
13
nistec
p-256
security issue
software
fix
implementation

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

38.8%

Multiplication of certain unreduced P-256 scalars produce incorrect results. There are no protocols known at this time that can be attacked due to this.

From the fix commit notes:

> Unlike the rest of nistec, the P-256 assembly doesn’t use complete addition formulas, meaning that p256PointAdd[Affine]Asm won’t return the correct value if the two inputs are equal.
>
> This was (undocumentedly) ignored in the scalar multiplication loops because as long as the input point is not the identity and the scalar is lower than the order of the group, the addition inputs can’t be the same.
>
> As part of the math/big rewrite, we went however from always reducing the scalar to only checking its length, under the incorrect assumption that the scalar multiplication loop didn’t require reduction.

Affected configurations

Vulners
Node
filippo.ionistecRange<0.0.2
VendorProductVersionCPE
filippo.ionistec*cpe:2.3:a:filippo.io:nistec:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

38.8%

Related for GHSA-F6HC-9G49-XMX7