4.3
CVSSv2

CVE-2017-8932

Published: 06/07/2017 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go prior to 1.7.6 and 1.8.x prior to 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to the derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

golang go 1.8

golang go 1.8.1

golang go

fedoraproject fedora 25

novell suse package hub for suse linux enterprise 12

opensuse leap 42.2

Vendor Advisories

Debian Bug report logs - #863307 golang-18: CVE-2017-8932: Elliptic curves carry propagation issue in x86-64 P-256 Package: src:golang-18; Maintainer for src:golang-18 is Go Compiler Team <pkg-golang-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 25 May 2017 09:30:0 ...
Golang: Elliptic curves carry propagation issue in x86-64 P-256 A carry propagation flaw was found in the implementation of the P-256 elliptic curve in golang An attacker could use this flaw to extract private keys when static ECDH is used (CVE-2017-8932) ...

Github Repositories

TLS Is Not For Obligatory Interception Lovers

tinfoil: TLS Is Not For Obligatory (Or Ostensibly Optional) Interception, Luckily 20180319 update - the TLS WG discussed version -01 of toolsietforg/html/draft-rhrd-tls-tls13-visibility-01 and there was no consensus to adopt that, so that proposal may now be dead 20171009 update, I've started to document the failings of the latest proposal we're forced to d