An issue in the cp_bbs_sig function in relic/src/cp/relic_cp_bbs.c of Relic relic-toolkit 0.6.0 allows a remote attacker to obtain sensitive information and escalate privileges via the cp_bbs_sig function.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/liang-junkai/Relic-bbs-fault-injection | patch exploit mitigation third party advisory |
https://github.com/relic-toolkit/relic/issues/284 | vendor advisory issue tracking |
https://gist.github.com/liang-junkai/1b59487c0f7002fa5da98035b53e409f | third party advisory |