SB2016110333 - Red Hat Enterprise Linux 7 update for nettle



SB2016110333 - Red Hat Enterprise Linux 7 update for nettle

Published: November 3, 2016 Updated: April 24, 2025

Security Bulletin ID SB2016110333
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 75% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Security Features (CVE-ID: CVE-2015-8803)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.


2) Security Features (CVE-ID: CVE-2015-8804)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

x86_64/ecc-384-modp.asm in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-384 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors.


3) Cryptographic issues (CVE-ID: CVE-2015-8805)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The ecc_256_modq function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8803.


4) Man-in-the-Middle attack (CVE-ID: CVE-2016-6489)

The vulnerability allows a remote attacker to perform a MitM attack.

The vulnerability exists due to an error in nettle-RSA code, which can be used in cache-sharing channel attacks. A remote attacker can create specially crafted RSA or DSA data and perform Man-in-the-Middle (MitM) attack.

Successful exploitation of this vulnerability will allow an attacker to gain access to potentially sensitive information.


Remediation

Install update from vendor's website.