Recovery attack in Go programming language - CVE-2017-8932
Published: July 13, 2017 / Updated: August 24, 2017
Vulnerability identifier: #VU7544
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-8932
CWE-ID: CWE-310
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Google
Affected software:
Go programming language
Go programming language
Detailed vulnerability description
The vulnerability allows a remote attacker to conduct recovery attack on the target system.
The weakness exists due to a flaw in the standard library ScalarMult implementation of curve P-256 for amd64 architectures. A remote attacker can submit specially crafted points and observe failures to the derive correct output to conduct full key recovery attack against static ECDH.
Successful exploitation of the vulnerability may result in further attacks.
The weakness exists due to a flaw in the standard library ScalarMult implementation of curve P-256 for amd64 architectures. A remote attacker can submit specially crafted points and observe failures to the derive correct output to conduct full key recovery attack against static ECDH.
Successful exploitation of the vulnerability may result in further attacks.
How to mitigate CVE-2017-8932
Update to version 1.8.2 or 1.9.