CMAC + SERPENT/IDEA/RC2 buffer overflow/crash with oversized key

Andreas Metzler ametzler at bebt.de
Fri Apr 2 18:00:02 CEST 2021


On 2021-03-31 Guido Vranken via Gcrypt-devel <gcrypt-devel at gnupg.org> wrote:
> In the program below, each of three calls to cmac() causes a different
> crash (use AddressSanitizer to be sure). I think the correct approach is to
> make gcry_mac_setkey() return an error code if the key has an inappropriate
> size.
[...]

Is this exploitable?

cu Andreas
-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'



More information about the Gcrypt-devel mailing list