Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-1255
HistoryApr 20, 2023 - 12:00 a.m.

CVE-2023-1255

2023-04-2000:00:00
ubuntu.com
ubuntu.com
54
cve-2023-1255
aes-xts
arm platform
crash
disk encryption
buffer overflow
denial of service
low severity

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

39.5%

Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM
platform contains a bug that could cause it to read past the input buffer,
leading to a crash. Impact summary: Applications that use the AES-XTS
algorithm on the 64 bit ARM platform can crash in rare circumstances. The
AES-XTS algorithm is usually used for disk encryption. The AES-XTS cipher
decryption implementation for 64 bit ARM platform will read past the end of
the ciphertext buffer if the ciphertext size is 4 mod 5 in 16 byte blocks,
e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is
unmapped, this will trigger a crash which results in a denial of service.
If an attacker can control the size and location of the ciphertext buffer
being decrypted by an application using AES-XTS on 64 bit ARM, the
application is affected. This is fairly unlikely making this issue a Low
severity one.

Notes

Author Note
mdeslaur 3.x only

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

39.5%