TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

SHA-3 Buffer Overflow

416 点作者 cbzbc超过 2 年前

20 条评论

ajsfoux234超过 2 年前
The vulnerability impacts 'the "official" SHA-3 implementation'. How widely used is it for SHA-3 hashing compared to something like OpenSSL?
评论 #33281871 未加载
评论 #33281727 未加载
metadat超过 2 年前
If you&#x27;re familiar with SHA-256 and this is your first encounter with SHA-3:<p>The main differences between the older SHA-256 of the SHA-2 family of FIPS 180, and the newer SHA3-256 of the SHA-3 family of FIPS 202, are:<p>* Resistance to length extension attacks.<p>* Performance. The SHA-2 functions—particularly SHA-512, SHA-512&#x2F;224, and SHA-512&#x2F;256—generally have higher performance than the SHA-3 functions. Partly this was out of paranoia and political reasons in the SHA-3 design process.<p>Further reading: <a href="https:&#x2F;&#x2F;crypto.stackexchange.com&#x2F;questions&#x2F;68307&#x2F;what-is-the-difference-between-sha-3-and-sha-256" rel="nofollow">https:&#x2F;&#x2F;crypto.stackexchange.com&#x2F;questions&#x2F;68307&#x2F;what-is-the...</a>
评论 #33282429 未加载
评论 #33283020 未加载
评论 #33281476 未加载
评论 #33281759 未加载
brundolf超过 2 年前
&gt; The vulnerable code was released in January 2011, so it took well over a decade for this vulnerability to be found<p>Ouch
评论 #33282459 未加载
评论 #33281675 未加载
bvrmn超过 2 年前
It looks pretty difficult to exploit. Untrusted 4GB input with non-chunked update.
评论 #33282332 未加载
评论 #33283962 未加载
throwaway81523超过 2 年前
Didn&#x27;t they find a vulnerability like this in the official MD5 implementation when they tried to port it to SPARK&#x2F;Ada and the proofs didn&#x27;t work? I wasn&#x27;t able to just find it with web search, but here&#x27;s a release about something similar happening with another one of the SHA3 candidates (Skein), before Keccak was chosen:<p><a href="https:&#x2F;&#x2F;www.adacore.com&#x2F;press&#x2F;spark-skein" rel="nofollow">https:&#x2F;&#x2F;www.adacore.com&#x2F;press&#x2F;spark-skein</a><p>See also: <a href="https:&#x2F;&#x2F;www.adacore.com&#x2F;papers&#x2F;sparkskein" rel="nofollow">https:&#x2F;&#x2F;www.adacore.com&#x2F;papers&#x2F;sparkskein</a>
评论 #33284567 未加载
computerfriend超过 2 年前
LibreSSL-based implementations seem unaffected. I can calculate that hash using hashlib without a segfault.
cipherboy超过 2 年前
Does this impact most distros? I&#x27;d imagine Python and PHP&#x27;s native crypto bindings would be replaced with OpenSSL which should have assembly variants of SHA-3.
评论 #33281422 未加载
tinglymintyfrsh超过 2 年前
Oh shit. I better check my native Ruby extension that I believe uses the reference C code.
评论 #33282125 未加载
all_these_years超过 2 年前
SHA-3 in Ruby:<p><pre><code> $ gem install sha3 $ irb &gt; require &#x27;sha3&#x27; &gt; s = SHA3::Digest::SHA224.new &gt; s.update(&quot;\x00&quot;) &gt; s.update(&quot;\x00&quot; * 4294967295) [ Segmentation fault... ] </code></pre> Tested with Ruby 3.1.2<p>Gem&#x27;s code (including C native extension): <a href="https:&#x2F;&#x2F;github.com&#x2F;johanns&#x2F;sha3" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;johanns&#x2F;sha3</a>
评论 #33284177 未加载
评论 #33313765 未加载
评论 #33284558 未加载
arisAlexis超过 2 年前
Can someone ELI5 the severity of this over the whole internet? What breaks&#x2F;what not
评论 #33283800 未加载
评论 #33281780 未加载
评论 #33282228 未加载
评论 #33281451 未加载
adunsulag超过 2 年前
FYI in the healthcare space to meet ONC Cures Update regulations for bulk patient export, its a requirement to use SHA384 (RS384 or ES384). I would think most implementations will be safe due to the 4GB payload criteria, but if anyone is doing anything funky they&#x27;ll need to look at this closely.
评论 #33289095 未加载
hasa超过 2 年前
It may be dumb question, but is there any realistic use case to use this vulnerability to reveal SHA-3 hashed secrets? Or is it just that attacker can crash systems with suitable input?
评论 #33285600 未加载
ouid超过 2 年前
What dows generating preimages mean here? The preimage is the set of all messages that hash to some set of hashes. Is the author saying the the hash function is reversible in reasonable time?
评论 #33282430 未加载
bobkazamakis超过 2 年前
<a href="https:&#x2F;&#x2F;www.xilinx.com&#x2F;products&#x2F;intellectual-property&#x2F;1-1mjenql.html" rel="nofollow">https:&#x2F;&#x2F;www.xilinx.com&#x2F;products&#x2F;intellectual-property&#x2F;1-1mje...</a><p><a href="https:&#x2F;&#x2F;documentation-service.arm.com&#x2F;static&#x2F;62bb3e4bb334256d9ea8d26f" rel="nofollow">https:&#x2F;&#x2F;documentation-service.arm.com&#x2F;static&#x2F;62bb3e4bb334256...</a>
Ptchd超过 2 年前
Does Tor use SHA-3?
Donckele超过 2 年前
“I’ve also shown how a specially constructed file can result in arbitrary code execution, ”<p>Ouch, thats not looking good for a reference implementation for a piece of software deployed on billions and billions of machines that was written by experts and reviewed (and modified) by even bigger egg heads.
评论 #33285218 未加载
评论 #33284826 未加载
评论 #33285428 未加载
aliqot超过 2 年前
Interesting they both say &quot;Official Sha3&quot; and &quot;by its designers&quot;, which as I remember it isn&#x27;t that accurate. Keccak was chosen and then NIST added what is affectionately known as the &#x27;mystery padding&#x27; before certification. What we know as official is not the way the designers submitted the proposal.<p>This isn&#x27;t an attempt at a scary accusation, but as a pedant, this got me.<p>For those wondering, here is an explanation by a commenter:<p><pre><code> The padding change is the only difference, this allows future tree hashing modes as well as the current SHAKE outputs to generate different digests given the same security parameters and message inputs. Up to 4 additional bits are added, which keeps the full padding inside a byte boundary, making implementations with octet only input able to switch to SHA-3 from Keccak with change to only a single line of code. </code></pre> <a href="https:&#x2F;&#x2F;crypto.stackexchange.com&#x2F;questions&#x2F;10645&#x2F;are-nists-changes-to-keccak-sha-3-problematic" rel="nofollow">https:&#x2F;&#x2F;crypto.stackexchange.com&#x2F;questions&#x2F;10645&#x2F;are-nists-c...</a><p><a href="https:&#x2F;&#x2F;cdt.org&#x2F;insights&#x2F;what-the-heck-is-going-on-with-nist%E2%80%99s-cryptographic-standard-sha-3&#x2F;" rel="nofollow">https:&#x2F;&#x2F;cdt.org&#x2F;insights&#x2F;what-the-heck-is-going-on-with-nist...</a><p>ketccak team&#x27;s response: <a href="https:&#x2F;&#x2F;keccak.team&#x2F;2013&#x2F;yes_this_is_keccak.html" rel="nofollow">https:&#x2F;&#x2F;keccak.team&#x2F;2013&#x2F;yes_this_is_keccak.html</a>
评论 #33282237 未加载
评论 #33282930 未加载
评论 #33284541 未加载
评论 #33281714 未加载
jbaczuk超过 2 年前
no bounty and still politely reports it. Good guys need more praise.
评论 #33283004 未加载
评论 #33284547 未加载
yieldcrv超过 2 年前
Bro what? This is a big deal right?<p>Like NSO Group hacking everyone for the next 5 years deal?
评论 #33285300 未加载
flatiron超过 2 年前
So if we ported this library to rust sha3 seems peachy? No doubt an interesting port but it now seems inevitable.
评论 #33282136 未加载
评论 #33282336 未加载
评论 #33282153 未加载
评论 #33282174 未加载