Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-37454

Опубликовано: 20 окт. 2022
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.

A flaw was found in the Keccak XKCP SHA-3 reference implementation. The sponge function interface allows partial input data to be processed, and partial output to be produced. When at least one of these has a length of 4294967096 bytes or more, it can result in elimination of cryptographic properties, execution of arbitrary code, or a denial of service.

Отчет

Python as shipped with Red Hat Red Hat Enterprise Linux is not affected by this flaw as it uses the OpenSSL SHA-3 implementation. PHP as shipped with Red Hat Enterprise Linux is affected but not vulnerable by default as it depends of the memory_limit[1] configuration setting to have a value of -1, indicating there is no limit, or to a value bigger than 4G. These values are very unlikely and to reflect this condition PHP was rated with a moderate security impact. [1]. https://www.php.net/manual/en/ini.core.php#ini.memory-limit

Меры по смягчению последствий

Library users can limit the size of partial input data or partial output digest to below 4294967096 bytes. Avoiding the queuing functions altogether by processing the entire input or producing the entire output at once does not trigger this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6phpOut of support scope
Red Hat Enterprise Linux 6pythonNot affected
Red Hat Enterprise Linux 7phpOut of support scope
Red Hat Enterprise Linux 7pythonNot affected
Red Hat Enterprise Linux 7python3Not affected
Red Hat Enterprise Linux 8python27:2.7/python2Not affected
Red Hat Enterprise Linux 8python3Not affected
Red Hat Enterprise Linux 8python36:3.6/python36Not affected
Red Hat Enterprise Linux 8python38:3.8/python38Not affected
Red Hat Enterprise Linux 8python39:3.9/python39Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-680
https://bugzilla.redhat.com/show_bug.cgi?id=2140200XKCP: buffer overflow in the SHA-3 reference implementation

EPSS

Процентиль: 78%
0.01202
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 2 лет назад

The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.

CVSS3: 9.8
nvd
больше 2 лет назад

The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.

CVSS3: 9.8
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 9.8
debian
больше 2 лет назад

The Keccak XKCP SHA-3 reference implementation before fdc6fef has an i ...

CVSS3: 9.8
github
около 2 лет назад

Buffer overflow in sponge queue functions

EPSS

Процентиль: 78%
0.01202
Низкий

8.1 High

CVSS3

Уязвимость CVE-2022-37454