Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2849

Опубликовано: 13 мая 2016
Источник: debian

Описание

Botan before 1.10.13 and 1.11.x before 1.11.29 do not use a constant-time algorithm to perform a modular inverse on the signature nonce k, which might allow remote attackers to obtain ECDSA secret keys via a timing side-channel attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
botan1.10fixed1.10.13-1package

Примечания

  • http://botan.randombit.net/security.html

  • Introduced in 1.7.15, fixed in 1.10.13 and 1.11.29

  • FIX https://github.com/randombit/botan/commit/bcf13fa153a11b3e0ad54e2af6962441cea3adf1

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 9 лет назад

Botan before 1.10.13 and 1.11.x before 1.11.29 do not use a constant-time algorithm to perform a modular inverse on the signature nonce k, which might allow remote attackers to obtain ECDSA secret keys via a timing side-channel attack.

CVSS3: 7.5
nvd
больше 9 лет назад

Botan before 1.10.13 and 1.11.x before 1.11.29 do not use a constant-time algorithm to perform a modular inverse on the signature nonce k, which might allow remote attackers to obtain ECDSA secret keys via a timing side-channel attack.

CVSS3: 7.5
github
больше 3 лет назад

Botan before 1.10.13 and 1.11.x before 1.11.29 do not use a constant-time algorithm to perform a modular inverse on the signature nonce k, which might allow remote attackers to obtain ECDSA secret keys via a timing side-channel attack.

suse-cvrf
больше 8 лет назад

Security update for Botan