First published: Thu Apr 20 2023(Updated: )
Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash. Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption. The AES-XTS cipher decryption implementation for 64 bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16 byte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is unmapped, this will trigger a crash which results in a denial of service. If an attacker can control the size and location of the ciphertext buffer being decrypted by an application using AES-XTS on 64 bit ARM, the application is affected. This is fairly unlikely making this issue a Low severity one.
Credit: openssl-security@openssl.org openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openssl | <=3.0.8-1<=1.1.1-1 | 3.0.9-1 3.1.1-1 1.1.1n-0+deb11u5 |
OpenSSL OpenSSL | >=3.0.0<3.0.9 | |
OpenSSL OpenSSL | >=3.1.0<3.1.1 | |
redhat/OpenSSL | <3.1.1 | 3.1.1 |
redhat/OpenSSL | <3.0.9 | 3.0.9 |
IBM QRadar WinCollect Agent | <=10.0-10.1.7 | |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.14-1~deb12u1 3.0.14-1~deb12u2 3.3.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1255 is a vulnerability in the AES-XTS cipher decryption implementation for the 64-bit ARM platform that can cause crashes due to reading past the input buffer.
Applications using the AES-XTS algorithm on the 64-bit ARM platform may be affected.
The severity of CVE-2023-1255 is high with a CVSS score of 5.9.
To fix CVE-2023-1255, update the affected OpenSSL package to the recommended versions: 3.0.2-0ubuntu1.10, 3.0.5-2ubuntu2.3, 3.0.8-1ubuntu1.2, 3.0.9-1, 3.1.1-1, or 1.1.1n-0+deb11u5.
More information about CVE-2023-1255 can be found at the following links: [link1], [link2], [link3].