CVE-2019-11840
golang.org/x/crypto: Keystream loop in amd64 assembly when overflowing 32-bit counter
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in the supplementary Go cryptography library, golang.org/x/crypto, before v0.0.0-20190320223903-b7391e95e576. A flaw was found in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa packages. If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to predictability in CSPRNG applications.
se descubrio un problema en Go cryptography libraries, también se conoce como golang-googlecode-go-crypto, anterior del 20-03-2019. Se encontró un fallo en la implementación de amd64 de golang.org/x/crypto/salsa20 y golang.org/x/crypto/salsa20/salsa. Si se generan más de 256 GiB de keystream, o si el contador crece más de 32 bits, la implementación de amd64 causará primero una salida incorrecta y entonces volverá a la secuencia de claves generada previamente. Los bytes repetidos de keystream pueden provocar la pérdida de confidencialidad en las aplicaciones de encriptación o la previsibilidad en las aplicaciones CSPRNG.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-05-09 CVE Reserved
- 2019-05-09 CVE Published
- 2024-08-04 CVE Updated
- 2024-11-08 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-330: Use of Insufficiently Random Values
CAPEC
References (12)
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://go.googlesource.com/crypto/+/b7391e95e576cacdcdd422573063bc057239113d | 2024-05-14 |
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1691529 | 2021-01-20 | |
https://access.redhat.com/security/cve/CVE-2019-11840 | 2021-01-20 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Golang Search vendor "Golang" | Crypto Search vendor "Golang" for product "Crypto" | < 2019-03-20 Search vendor "Golang" for product "Crypto" and version " < 2019-03-20" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|