Description
Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the low-order bits of SHA512(password) by inspecting protocol traffic.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4064-1 | chromium-browser security update |
EUVD |
EUVD-2017-6875 | Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the low-order bits of SHA512(password) by inspecting protocol traffic. |
References
History
No history.
Status: PUBLISHED
Assigner: Chrome
Published:
Updated: 2024-08-05T19:57:25.991Z
Reserved: 2017-10-17T00:00:00.000Z
Link: CVE-2017-15423
No data.
Status : Modified
Published: 2018-08-28T19:29:12.083
Modified: 2024-11-21T03:14:40.423
Link: CVE-2017-15423
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD