{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1255","assignerOrgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","state":"PUBLISHED","assignerShortName":"openssl","dateReserved":"2023-03-07T14:56:07.099Z","datePublished":"2023-04-20T16:14:54.707Z","dateUpdated":"2025-02-13T16:39:19.031Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"OpenSSL","vendor":"OpenSSL","versions":[{"lessThan":"3.1.1","status":"affected","version":"3.1.0","versionType":"semver"},{"lessThan":"3.0.9","status":"affected","version":"3.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Anton Romanov (Amazon)"},{"lang":"en","type":"remediation developer","user":"00000000-0000-4000-9000-000000000000","value":"Nevine Ebeid (Amazon)"}],"datePublic":"2023-03-21T00:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM<br>platform contains a bug that could cause it to read past the input buffer,<br>leading to a crash.<br><br>Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM<br>platform can crash in rare circumstances. The AES-XTS algorithm is usually<br>used for disk encryption.<br><br>The AES-XTS cipher decryption implementation for 64 bit ARM platform will read<br>past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16<br>byte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext<br>buffer is unmapped, this will trigger a crash which results in a denial of<br>service.<br><br>If an attacker can control the size and location of the ciphertext buffer<br>being decrypted by an application using AES-XTS on 64 bit ARM, the<br>application is affected. This is fairly unlikely making this issue<br>a Low severity one."}],"value":"Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM\nplatform contains a bug that could cause it to read past the input buffer,\nleading to a crash.\n\nImpact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM\nplatform can crash in rare circumstances. The AES-XTS algorithm is usually\nused for disk encryption.\n\nThe AES-XTS cipher decryption implementation for 64 bit ARM platform will read\npast the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16\nbyte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext\nbuffer is unmapped, this will trigger a crash which results in a denial of\nservice.\n\nIf an attacker can control the size and location of the ciphertext buffer\nbeing decrypted by an application using AES-XTS on 64 bit ARM, the\napplication is affected. This is fairly unlikely making this issue\na Low severity one."}],"metrics":[{"format":"other","other":{"content":{"text":"Low"},"type":"https://www.openssl.org/policies/secpolicy.html"}}],"problemTypes":[{"descriptions":[{"description":"buffer over-read","lang":"en"}]}],"providerMetadata":{"orgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","shortName":"openssl","dateUpdated":"2023-09-08T16:06:36.509Z"},"references":[{"name":"OpenSSL Advisory","tags":["vendor-advisory"],"url":"https://www.openssl.org/news/secadv/20230419.txt"},{"name":"3.1.1 git commit","tags":["patch"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bc2f61ad70971869b242fc1cb445b98bad50074a"},{"name":"3.0.9 git commit","tags":["patch"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb"},{"url":"https://security.netapp.com/advisory/ntap-20230908-0006/"}],"source":{"discovery":"UNKNOWN"},"title":"Input buffer over-read in AES-XTS implementation on 64 bit ARM","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:40:59.617Z"},"title":"CVE Program Container","references":[{"name":"OpenSSL Advisory","tags":["vendor-advisory","x_transferred"],"url":"https://www.openssl.org/news/secadv/20230419.txt"},{"name":"3.1.1 git commit","tags":["patch","x_transferred"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bc2f61ad70971869b242fc1cb445b98bad50074a"},{"name":"3.0.9 git commit","tags":["patch","x_transferred"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb"},{"url":"https://security.netapp.com/advisory/ntap-20230908-0006/","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-125","lang":"en","description":"CWE-125 Out-of-bounds Read"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.9,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-02-04T21:14:55.272222Z","id":"CVE-2023-1255","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-04T21:16:24.506Z"}}]}}