Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-2881

Опубликовано: 30 авг. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 6.7

Описание

Fault Injection vulnerability in wc_ed25519_sign_msg function in wolfssl/wolfcrypt/src/ed25519.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate privileges via Rowhammer fault injection to the ed25519_key structure.

РелизСтатусПримечание
devel

not-affected

5.7.0-0.3
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

noble

needs-triage

oracular

not-affected

5.7.0-0.3

Показывать по

EPSS

Процентиль: 53%
0.003
Низкий

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.7
nvd
больше 1 года назад

Fault Injection vulnerability in wc_ed25519_sign_msg function in wolfssl/wolfcrypt/src/ed25519.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate privileges via Rowhammer fault injection to the ed25519_key structure.

CVSS3: 8.8
msrc
около 1 года назад

Описание отсутствует

CVSS3: 6.7
debian
больше 1 года назад

Fault Injection vulnerability inwc_ed25519_sign_msg function in wolfss ...

CVSS3: 6.7
github
больше 1 года назад

Fault Injection vulnerability in wc_ed25519_sign_msg function in wolfssl/wolfcrypt/src/ed25519.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate privileges via Rowhammer fault injection to the ed25519_key structure.

EPSS

Процентиль: 53%
0.003
Низкий

6.7 Medium

CVSS3