CVE-2024-9143
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
16/10/2024
Last modified:
03/11/2025
Description
Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted<br />
explicit values for the field polynomial can lead to out-of-bounds memory reads<br />
or writes.<br />
<br />
Impact summary: Out of bound memory writes can lead to an application crash or<br />
even a possibility of a remote code execution, however, in all the protocols<br />
involving Elliptic Curve Cryptography that we&#39;re aware of, either only "named<br />
curves" are supported, or, if explicit curve parameters are supported, they<br />
specify an X9.62 encoding of binary (GF(2^m)) curves that can&#39;t represent<br />
problematic input values. Thus the likelihood of existence of a vulnerable<br />
application is low.<br />
<br />
In particular, the X9.62 encoding is used for ECC keys in X.509 certificates,<br />
so problematic inputs cannot occur in the context of processing X.509<br />
certificates. Any problematic use-cases would have to be using an "exotic"<br />
curve encoding.<br />
<br />
The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(),<br />
and various supporting BN_GF2m_*() functions.<br />
<br />
Applications working with "exotic" explicit binary (GF(2^m)) curve parameters,<br />
that make it possible to represent invalid field polynomials with a zero<br />
constant term, via the above or similar APIs, may terminate abruptly as a<br />
result of reading or writing outside of array bounds. Remote code execution<br />
cannot easily be ruled out.<br />
<br />
The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
Impact
Base Score 3.x
4.30
Severity 3.x
MEDIUM
References to Advisories, Solutions, and Tools
- https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712
- https://github.com/openssl/openssl/commit/bc7e04d7c8d509fb78fc0e285aa948fb0da04700
- https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4
- https://github.com/openssl/openssl/commit/fdf6723362ca51bd883295efe206cb5b1cfa5154
- https://github.openssl.org/openssl/extended-releases/commit/8efc0cbaa8ebba8e116f7b81a876a4123594d86a
- https://github.openssl.org/openssl/extended-releases/commit/9d576994cec2b7aa37a91740ea7e680810957e41
- https://openssl-library.org/news/secadv/20241016.txt
- http://www.openwall.com/lists/oss-security/2024/10/16/1
- http://www.openwall.com/lists/oss-security/2024/10/23/1
- http://www.openwall.com/lists/oss-security/2024/10/24/1
- https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00000.html
- https://security.netapp.com/advisory/ntap-20241101-0001/



