mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 18:21:17 +00:00
28 lines
1.7 KiB
JSON
28 lines
1.7 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2023-1255",
|
||
|
"sourceIdentifier": "openssl-security@openssl.org",
|
||
|
"published": "2023-04-20T17:15:06.883",
|
||
|
"lastModified": "2023-04-21T09:15:07.340",
|
||
|
"vulnStatus": "Awaiting Analysis",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM\nplatform contains a bug that could cause it to read past the input buffer,\nleading to a crash.\n\nImpact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM\nplatform can crash in rare circumstances. The AES-XTS algorithm is usually\nused for disk encryption.\n\nThe AES-XTS cipher decryption implementation for 64 bit ARM platform will read\npast the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16\nbyte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext\nbuffer is unmapped, this will trigger a crash which results in a denial of\nservice.\n\nIf an attacker can control the size and location of the ciphertext buffer\nbeing decrypted by an application using AES-XTS on 64 bit ARM, the\napplication is affected. This is fairly unlikely making this issue\na Low severity one."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {},
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb",
|
||
|
"source": "openssl-security@openssl.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bc2f61ad70971869b242fc1cb445b98bad50074a",
|
||
|
"source": "openssl-security@openssl.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.openssl.org/news/secadv/20230419.txt",
|
||
|
"source": "openssl-security@openssl.org"
|
||
|
}
|
||
|
]
|
||
|
}
|