Recovery attack in Go programming language - CVE-2017-8932

 

Recovery attack in Go programming language - CVE-2017-8932

Published: July 13, 2017 / Updated: August 24, 2017


Vulnerability identifier: #VU7544
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-8932
CWE-ID: CWE-310
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Google
Affected software:
Go programming language

Detailed vulnerability description

The vulnerability allows a remote attacker to conduct recovery attack on the target system.

The weakness exists due to a flaw in the standard library ScalarMult implementation of curve P-256 for amd64 architectures. A remote attacker can submit specially crafted points and observe failures to the derive correct output to conduct full key recovery attack against static ECDH.

Successful exploitation of the vulnerability may result in further attacks.

How to mitigate CVE-2017-8932

Update to version 1.8.2 or 1.9.

Sources