CVE-2019-25003

An issue was discovered in the libsecp256k1 crate before 0.3.1 for Rust. Scalar::check_overflow allows a timing side-channel attack; consequently, attackers can obtain sensitive information.
References
Link Resource
https://rustsec.org/advisories/RUSTSEC-2019-0027.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:parity:libsecp256k1:*:*:*:*:*:rust:*:*

History

06 Jan 2021, 20:12

Type Values Removed Values Added
CWE NVD-CWE-Other
CPE cpe:2.3:a:parity:libsecp256k1:*:*:*:*:*:rust:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
References (MISC) https://rustsec.org/advisories/RUSTSEC-2019-0027.html - (MISC) https://rustsec.org/advisories/RUSTSEC-2019-0027.html - Third Party Advisory

31 Dec 2020, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2020-12-31 10:15

Updated : 2023-12-10 13:41


NVD link : CVE-2019-25003

Mitre link : CVE-2019-25003

CVE.ORG link : CVE-2019-25003


JSON object : View

Products Affected

parity

  • libsecp256k1