Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7822

Опубликовано: 11 июн. 2018
Источник: debian
EPSS Низкий

Описание

The AES-GCM implementation in WebCrypto API accepts 0-length IV when it should require a length of 1 according to the NIST Special Publication 800-38D specification. This might allow for the authentication key to be determined in some instances. This vulnerability affects Firefox < 56.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed56.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2017-21/#CVE-2017-7822

EPSS

Процентиль: 69%
0.00612
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 7 лет назад

The AES-GCM implementation in WebCrypto API accepts 0-length IV when it should require a length of 1 according to the NIST Special Publication 800-38D specification. This might allow for the authentication key to be determined in some instances. This vulnerability affects Firefox < 56.

CVSS3: 5.3
nvd
больше 7 лет назад

The AES-GCM implementation in WebCrypto API accepts 0-length IV when it should require a length of 1 according to the NIST Special Publication 800-38D specification. This might allow for the authentication key to be determined in some instances. This vulnerability affects Firefox < 56.

CVSS3: 5.3
github
больше 3 лет назад

The AES-GCM implementation in WebCrypto API accepts 0-length IV when it should require a length of 1 according to the NIST Special Publication 800-38D specification. This might allow for the authentication key to be determined in some instances. This vulnerability affects Firefox < 56.

CVSS3: 5.3
fstec
больше 8 лет назад

Уязвимость реализации режима AES-GCM интерфейса WebCrypto API браузера Mozilla Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 69%
0.00612
Низкий