Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
leancrypto: Integer truncation in X.509 name parser enables certificate identity impersonation
Vulnerability Description
The leancrypto library is a cryptographic library that exclusively contains only PQC-resistant cryptographic algorithms. Prior to version 1.7.1, lc_x509_extract_name_segment() casts size_t vlen to uint8_t when storing the Common Name (CN) length. An attacker who crafts a certificate with CN = victim's CN + 256 bytes padding gets cn_size = (uint8_t)(256 + N) = N, where N is the victim's CN length. The first N bytes of the attacker's CN are the victim's identity. After parsing, the attacker's certificate has an identical CN to the victim's — enabling identity impersonation in PKCS#7 verification, certificate chain matching, and code signing. This issue has been patched in version 1.7.1.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Vulnerability Type
数值类型间的不正确转换
Vulnerability Title
Lean Crypto Library 安全漏洞
Vulnerability Description
Lean Crypto Library是smuellerDD个人开发者的一个轻量级抗量子密码算法库。 Lean Crypto Library 1.7.1之前版本存在安全漏洞,该漏洞源于lc_x509_extract_name_segment函数将size_t转换为uint8_t时存在整数溢出,可能导致身份冒充。
CVSS Information
N/A
Vulnerability Type
N/A