Release Date: | 2021-04-05 | |
Impact: | None | What is this? |
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.
See more information about CVE-2021-20305 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
Base Score: | 8.1 |
Vector String: | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
Version: | 3.0 |
Attack Vector: | Network |
Attack Complexity: | High |
Privileges Required: | None |
User Interaction: | None |
Scope: | Unchanged |
Confidentiality Impact: | High |
Integrity Impact: | High |
Availability Impact: | High |
Platform | Errata | Release Date |
Oracle Linux version 7 (nettle) | ELSA-2021-1145 | 2021-04-09 |
Oracle Linux version 8 (gnutls) | ELSA-2021-1206 | 2021-04-16 |
Oracle Linux version 8 (nettle) | ELSA-2021-1206 | 2021-04-16 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: