Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-13628

Опубликовано: 03 окт. 2019
Источник: debian
EPSS Низкий

Описание

wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wolfsslfixed4.1.0+dfsg-1package

Примечания

  • https://github.com/wolfSSL/wolfssl/pull/2353

EPSS

Процентиль: 35%
0.00145
Низкий

Связанные уязвимости

CVSS3: 4.7
ubuntu
больше 6 лет назад

wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.

CVSS3: 4.7
nvd
больше 6 лет назад

wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.

CVSS3: 4.7
github
больше 3 лет назад

wolfCrypt leaks cryptographic information via timing side channel

EPSS

Процентиль: 35%
0.00145
Низкий