CVE-2023-36327

Integer Overflow vulnerability in RELIC before commit 421f2e91cf2ba42473d4d54daf24e295679e290e, allows attackers to execute arbitrary code and cause a denial of service in pos argument in bn_get_prime function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:relic_project:relic:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:09

Type Values Removed Values Added
References () https://github.com/relic-toolkit/relic/commit/421f2e91cf2ba42473d4d54daf24e295679e290e - Patch () https://github.com/relic-toolkit/relic/commit/421f2e91cf2ba42473d4d54daf24e295679e290e - Patch
References () https://groups.google.com/g/relic-discuss/c/A_J2-ArVIAo/m/qgFiXsUJBQAJ?utm_medium=email&utm_source=footer - Mailing List () https://groups.google.com/g/relic-discuss/c/A_J2-ArVIAo/m/qgFiXsUJBQAJ?utm_medium=email&utm_source=footer - Mailing List

06 Sep 2023, 00:05

Type Values Removed Values Added
CWE CWE-190
First Time Relic Project relic
Relic Project
CPE cpe:2.3:a:relic_project:relic:*:*:*:*:*:*:*:*
References (MISC) https://github.com/relic-toolkit/relic/commit/421f2e91cf2ba42473d4d54daf24e295679e290e - (MISC) https://github.com/relic-toolkit/relic/commit/421f2e91cf2ba42473d4d54daf24e295679e290e - Patch
References (MISC) https://groups.google.com/g/relic-discuss/c/A_J2-ArVIAo/m/qgFiXsUJBQAJ?utm_medium=email&utm_source=footer - (MISC) https://groups.google.com/g/relic-discuss/c/A_J2-ArVIAo/m/qgFiXsUJBQAJ?utm_medium=email&utm_source=footer - Mailing List
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

01 Sep 2023, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-01 16:15

Updated : 2024-11-21 08:09


NVD link : CVE-2023-36327

Mitre link : CVE-2023-36327

CVE.ORG link : CVE-2023-36327


JSON object : View

Products Affected

relic_project

  • relic
CWE
CWE-190

Integer Overflow or Wraparound