MEDIUM · 5.9

CVE-2017-8932

A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input poi...

Vulnerability Description

A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to the derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries.

CVSS Score

5.9

MEDIUM

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
GolangGo<= 1.7.5
NovellSuse Package Hub For Suse Linux Enterprise12
FedoraprojectFedora25
OpensuseLeap42.2

Related Weaknesses (CWE)

References

FAQ

What is CVE-2017-8932?

CVE-2017-8932 is a vulnerability with a CVSS score of 5.9 (MEDIUM). A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input poi...

How severe is CVE-2017-8932?

CVE-2017-8932 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2017-8932?

Check the references section above for vendor advisories and patch information. Affected products include: Golang Go, Novell Suse Package Hub For Suse Linux Enterprise, Fedoraproject Fedora, Opensuse Leap.