CVE-2020-12403
nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Se encontró un fallo en la manera en que se implementó CHACHA20-POLY1305 en NSS en versiones anteriores a 3.55. Cuando es usado Chacha20 de múltiples partes, podría causar lecturas fuera de límites. Este problema fue corregido al desactivar explícitamente ChaCha20 de múltiples partes (que no funcionaba correctamente) y aplicando estrictamente la longitud de la etiqueta. La mayor amenaza de esta vulnerabilidad es la confidencialidad y la disponibilidad del sistema
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Red Hat OpenShift Do is a simple CLI tool for developers to create, build, and deploy applications on OpenShift. The odo tool is completely client-based and requires no server within the OpenShift cluster for deployment. It detects changes to local code and deploys it to the cluster automatically, giving instant feedback to validate changes in real-time. It supports multiple programming languages and frameworks. Red Hat OpenShift Do openshift/odo-init-image 1.1.3 is a container image that is used as part of the InitContainer setup that provisions odo components.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-04-28 CVE Reserved
- 2020-08-19 CVE Published
- 2024-08-04 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html | Mailing List |
|
https://security.netapp.com/advisory/ntap-20230324-0006 |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1868931 | 2021-03-30 |
URL | Date | SRC |
---|---|---|
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes | 2023-03-24 | |
https://access.redhat.com/security/cve/CVE-2020-12403 | 2021-03-30 |