{"id":"CVE-2015-8805","details":"The ecc_256_modq function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8803.","modified":"2026-04-16T01:41:33.792857980Z","published":"2016-02-23T19:59:03Z","withdrawn":"2026-01-27T04:15:18.315180Z","related":["SUSE-SU-2016:0455-1","openSUSE-SU-2024:10339-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2582.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2897-1"},{"type":"ARTICLE","url":"https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html"},{"type":"FIX","url":"https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/02/02/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/02/03/1"},{"type":"WEB","url":"http://www.securityfocus.com/bid/84272"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}