7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Botan Vulnerable to Denial of Service Due to Overly Large Elliptic Curve Parameters
Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. Prior to versions 3.3.0 and 2.19.4, an attacker could present an ECDSA X.509 certificate using explicit encoding where the parameters are very large. The proof of concept used a 16Kbit prime for this purpose. When parsing, the parameter is checked to be prime, causing excessive computation. This was patched in 2.19.4 and 3.3.0 to allow the prime parameter of the elliptic curve to be at most 521 bits. No known workarounds are available. Note that support for explicit encoding of elliptic curve parameters is deprecated in Botan.
References
- https://github.com/randombit/botan/security/advisories/GHSA-w4g2-7m2h-7xj7 x_refsource_CONFIRM
- https://github.com/randombit/botan/commit/08c404b23740babee1f6aa51b54e966029aadee4 x_refsource_MISC
- https://github.com/randombit/botan/commit/94e9154c143aa5264da6254a6a1be5bc66ee2b5a x_refsource_MISC
- https://github.com/randombit/botan/commit/94e9154c143aa5264da6254a6a1be5bc66ee2b5a x_refsource_MISC
- https://github.com/randombit/botan/security/advisories/GHSA-w4g2-7m2h-7xj7 x_refsource_CONFIRM
- https://github.com/randombit/botan/commit/08c404b23740babee1f6aa51b54e966029aadee4 x_refsource_MISC
- https://github.com/randombit/botan/security/advisories/GHSA-w4g2-7m2h-7xj7 x_refsource_CONFIRM
- https://github.com/randombit/botan/commit/08c404b23740babee1f6aa51b54e966029aadee4 x_refsource_MISC
- https://github.com/randombit/botan/commit/94e9154c143aa5264da6254a6a1be5bc66ee2b5a x_refsource_MISC
- https://github.com/randombit/botan/commit/94e9154c143aa5264da6254a6a1be5bc66ee2b5a x_refsource_MISC x_transferred
- https://github.com/randombit/botan/security/advisories/GHSA-w4g2-7m2h-7xj7 x_refsource_CONFIRM x_transferred
- https://github.com/randombit/botan/commit/08c404b23740babee1f6aa51b54e966029aadee4 x_refsource_MISC x_transferred
- https://github.com/randombit/botan/commit/94e9154c143aa5264da6254a6a1be5bc66ee2b5a x_refsource_MISC
- https://github.com/randombit/botan/security/advisories/GHSA-w4g2-7m2h-7xj7 x_refsource_CONFIRM
- https://github.com/randombit/botan/commit/08c404b23740babee1f6aa51b54e966029aadee4 x_refsource_MISC
- https://github.com/randombit/botan/security/advisories/GHSA-w4g2-7m2h-7xj7 x_refsource_CONFIRM x_transferred
- https://github.com/randombit/botan/commit/08c404b23740babee1f6aa51b54e966029aadee4 x_refsource_MISC x_transferred
- https://github.com/randombit/botan/commit/94e9154c143aa5264da6254a6a1be5bc66ee2b5a x_refsource_MISC x_transferred
Affected products
- ==>= 3.0.0-alpha0, < 3.3.0
- ==< 2.19.4
- <3.3.1
- ==>= 3.3.0, < 3.3.0
- <2.19.4
Matching in nixpkgs
pkgs.botan2
Cryptographic algorithms library
pkgs.botan3
Cryptographic algorithms library
pkgs.botanEsdm
Cryptographic algorithms library
pkgs.emiluaPlugins.botan
Securely clears secrets from memory in Emilua
pkgs.python312Packages.botan3
Python Bindings for botan3 cryptography library
-
nixos-unstable botan3-3.10.0
- nixpkgs-unstable botan3-3.10.0
- nixos-unstable-small botan3-3.10.0
pkgs.python313Packages.botan3
Python Bindings for botan3 cryptography library
-
nixos-unstable botan3-3.10.0
- nixpkgs-unstable botan3-3.10.0
- nixos-unstable-small botan3-3.10.0
pkgs.haskellPackages.botan-low
Low-level Botan bindings
pkgs.haskellPackages.botan-bindings
Raw Botan bindings
pkgs.chickenPackages_5.chickenEggs.botan
Bindings to the Botan cryptographic library
Package maintainers
-
@7c6f434c Michael Raskin <7c6f434c@mail.ru>
-
@thillux Markus Theil <theil.markus@gmail.com>
-
@manipuladordedados Valter Nazianzeno <manipuladordedados@gmail.com>
-
@nikstur nikstur <nikstur@outlook.com>
-
@mikatammi Mika Tammi <mikatammi@gmail.com>