CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
82.5%
The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not
properly handle carry propagation and produces incorrect output in its
implementation of the P-256 NIST elliptic curve, which allows attackers to
have unspecified impact via unknown vectors, a different vulnerability than
CVE-2015-8805.
seclists.org/oss-sec/2016/q1/273
blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html
launchpad.net/bugs/cve/CVE-2015-8803
lists.gnu.org/archive/html/info-gnu/2016-01/msg00006.html
lists.lysator.liu.se/pipermail/nettle-bugs/2015/003028.html
nvd.nist.gov/vuln/detail/CVE-2015-8803
security-tracker.debian.org/tracker/CVE-2015-8803
ubuntu.com/security/notices/USN-2897-1
www.cve.org/CVERecord?id=CVE-2015-8803
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
82.5%