Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-19963

Опубликовано: 25 дек. 2019
Источник: debian
EPSS Низкий

Описание

An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wolfsslfixed4.3.0+dfsg-1package

Примечания

  • https://github.com/wolfSSL/wolfssl/commit/7e391f0fd57f2ef375b1174d752a56ce34b2b190 (v4.3.0-stable)

EPSS

Процентиль: 57%
0.00356
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 6 лет назад

An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.

CVSS3: 5.3
nvd
около 6 лет назад

An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.

CVSS3: 5.3
github
больше 3 лет назад

An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.

EPSS

Процентиль: 57%
0.00356
Низкий