Out-of-Bound Memory Reads or Writes in Low-Level GF(2^m) Elliptic Curve APIs
CVE-2024-9143

4.3MEDIUM

Key Information:

Vendor

OpenSSL

Status
Vendor
CVE Published:
16 October 2024

Badges

👾 Exploit Exists📰 News Worthy

What is CVE-2024-9143?

An issue exists with the low-level GF(2^m) elliptic curve APIs in OpenSSL, where the use of untrusted explicit values for the field polynomial may result in out-of-bounds memory reads or writes. This vulnerability can lead to application crashes and has the potential for remote code execution in specific circumstances. The impact is generally low due to the limited support for 'exotic' curve parameters in typical use cases of Elliptic Curve Cryptography (ECC). Most protocols leveraging ECC rely on named curves or X9.62 encoded binary curves that negate the possibility of invalid input values. The affected APIs, including EC_GROUP_new_curve_GF2m() and EC_GROUP_new_from_params(), are particularly relevant for applications manipulating 'exotic' binary curve parameters that could instantiate invalid field polynomials. However, the FIPS modules in versions 3.3, 3.2, 3.1, and 3.0 remain unaffected.

Affected Version(s)

OpenSSL 3.3.0 < 3.3.3

OpenSSL 3.2.0 < 3.2.4

OpenSSL 3.1.0 < 3.1.8

News Articles

Google Confirms Critical Security Flaw Using AI

Google’s security team has uncovered a two-decades old critical open-source vulnerability which would have continued to be hidden without the help of AI.

Google Confirms Critical Security Flaw Using AI

Google’s security team has uncovered a two-decades old critical open-source vulnerability which would have continued to be hidden without the help of AI.

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by Forbes

  • Vulnerability published

Credit

Google OSS-Fuzz-Gen
Viktor Dukhovni
.