9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.5%
The ecc_256_modq function in ecc-256.c in Nettle before 3.2 does not
properly handle carry propagation and produces incorrect output in its
implementation of the P-256 NIST elliptic curve, which allows attackers to
have unspecified impact via unknown vectors, a different vulnerability than
CVE-2015-8803.
Author | Note |
---|---|
mdeslaur | same patch as CVE-2015-8803 |
seclists.org/oss-sec/2016/q1/273
blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8805
launchpad.net/bugs/cve/CVE-2015-8805
lists.gnu.org/archive/html/info-gnu/2016-01/msg00006.html
nvd.nist.gov/vuln/detail/CVE-2015-8805
security-tracker.debian.org/tracker/CVE-2015-8805
ubuntu.com/security/notices/USN-2897-1
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.5%