Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-14318

Опубликовано: 30 июл. 2019
Источник: debian
EPSS Низкий

Описание

Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (binary field curves, large leakage) is not constant time and leaks the bit length of the scalar among other information.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libcrypto++fixed8.2.0-2experimentalpackage
libcrypto++fixed5.6.4-9package
libcrypto++no-dsabusterpackage
libcrypto++no-dsastretchpackage
libcrypto++no-dsajessiepackage

Примечания

  • https://github.com/weidai11/cryptopp/issues/869

EPSS

Процентиль: 85%
0.02374
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 6 лет назад

Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (binary field curves, large leakage) is not constant time and leaks the bit length of the scalar among other information.

CVSS3: 5.9
nvd
больше 6 лет назад

Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (binary field curves, large leakage) is not constant time and leaks the bit length of the scalar among other information.

suse-cvrf
больше 6 лет назад

Security update for libcryptopp

CVSS3: 5.9
github
больше 3 лет назад

Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (binary field curves, large leakage) is not constant time and leaks the bit length of the scalar among other information.

EPSS

Процентиль: 85%
0.02374
Низкий