The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
21 Nov 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://csrc.nist.gov/projects/hash-functions/sha-3-project - Third Party Advisory, US Government Resource | |
References | () https://eprint.iacr.org/2023/331 - | |
References | () https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658 - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/10/msg00041.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/11/msg00000.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ALQ6BDDPX5HU5YBQOBMDVAA2TSGDKIJ/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMIEXLMTW5GO36HTFFWIPB3OHZXCT3G4/ - Mailing List, Third Party Advisory | |
References | () https://mouha.be/sha-3-buffer-overflow/ - Exploit, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=33281106 - Issue Tracking, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=35050307 - | |
References | () https://security.gentoo.org/glsa/202305-02 - | |
References | () https://www.debian.org/security/2022/dsa-5267 - Third Party Advisory | |
References | () https://www.debian.org/security/2022/dsa-5269 - Third Party Advisory |
03 May 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Mar 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Nov 2022, 18:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:php:php:*:*:*:*:*:*:*:* cpe:2.3:a:sha3_project:sha3:*:*:*:*:*:ruby:*:* cpe:2.3:a:pysha3_project:pysha3:*:*:*:*:*:*:*:* cpe:2.3:a:python:python:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:a:pypy:pypy:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/10/msg00041.html - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMIEXLMTW5GO36HTFFWIPB3OHZXCT3G4/ - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ALQ6BDDPX5HU5YBQOBMDVAA2TSGDKIJ/ - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5269 - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00000.html - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5267 - Third Party Advisory |
04 Nov 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Oct 2022, 15:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:extended_keccak_code_package_project:extended_keccak_code_package:-:*:*:*:*:*:*:* | |
CWE | CWE-190 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://news.ycombinator.com/item?id=33281106 - Issue Tracking, Third Party Advisory | |
References | (MISC) https://csrc.nist.gov/projects/hash-functions/sha-3-project - Third Party Advisory, US Government Resource | |
References | (MISC) https://mouha.be/sha-3-buffer-overflow/ - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658 - Patch, Third Party Advisory |
21 Oct 2022, 06:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-21 06:15
Updated : 2024-11-21 07:15
NVD link : CVE-2022-37454
Mitre link : CVE-2022-37454
CVE.ORG link : CVE-2022-37454
JSON object : View
Products Affected
pysha3_project
- pysha3
extended_keccak_code_package_project
- extended_keccak_code_package
fedoraproject
- fedora
debian
- debian_linux
php
- php
sha3_project
- sha3
pypy
- pypy
python
- python
CWE
CWE-190
Integer Overflow or Wraparound