Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-37305
HistoryJun 17, 2024 - 7:42 p.m.

CVE-2024-37305 Buffer overflow in deserialization in oqs-provider

2024-06-1719:42:22
CWE-680
CWE-190
CWE-805
CWE-130
CWE-120
GitHub_M
github.com
1
cve-2024-37305
buffer overflow
oqs-provider
openssl 3
cryptography library
post-quantum cryptography
tls
x.509
s/mime
liboqs
decode_uint32
serialized hybrid keys
information leakage
memory reads
v0.6.1

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

oqs-provider is a provider for the OpenSSL 3 cryptography library that adds support for post-quantum cryptography in TLS, X.509, and S/MIME using post-quantum algorithms from liboqs. Flaws have been identified in the way oqs-provider handles lengths decoded with DECODE_UINT32 at the start of serialized hybrid (traditional + post-quantum) keys and signatures. Unchecked length values are later used for memory reads and writes; malformed input can lead to crashes or information leakage. Handling of plain/non-hybrid PQ key operation is not affected. This issue has been patched in in v0.6.1. All users are advised to upgrade. There are no workarounds for this issue.

CNA Affected

[
  {
    "vendor": "open-quantum-safe",
    "product": "oqs-provider",
    "versions": [
      {
        "version": "< 0.6.1",
        "status": "affected"
      }
    ]
  }
]

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for VULNRICHMENT:CVE-2024-37305