Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2022-02820

Опубликовано: 10 дек. 2021
Источник: fstec
CVSS3: 5.9
CVSS2: 5.4
EPSS Низкий

Описание

Уязвимость процедур возведения в квадрат MIPS32 и MIPS64 библиотеки OpenSSL связана с повторным использованием закрытых ключей. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, раскрыть защищаемую информацию

Вендор

Сообщество свободного программного обеспечения
NetApp Inc.
Oracle Corp.
OpenSSL Software Foundation
АО "НППКТ"
АО «НТЦ ИТ РОСА»

Наименование ПО

Debian GNU/Linux
ONTAP Select Deploy
PeopleSoft Enterprise PeopleTools
NetApp SolidFire
HCI Compute Node (Bootstrap OS)
OpenSSL
Clustered Data ONTAP Antivirus Connector
NetApp SMI-S Provider
Oracle Health Sciences InForm Publisher
ОСОН ОСнова Оnyx
ROSA Virtualization
ROSA Virtualization 3.0

Версия ПО

9 (Debian GNU/Linux)
10 (Debian GNU/Linux)
- (ONTAP Select Deploy)
8.58 (PeopleSoft Enterprise PeopleTools)
11 (Debian GNU/Linux)
- (NetApp SolidFire)
8.59 (PeopleSoft Enterprise PeopleTools)
- (HCI Compute Node (Bootstrap OS))
от 1.1.1 до 1.1.1m (OpenSSL)
от 3.0.0 до 3.0.1 (OpenSSL)
от 1.0.2 до 1.0.2zb включительно (OpenSSL)
- (Clustered Data ONTAP Antivirus Connector)
- (NetApp SMI-S Provider)
6.2.1.1 (Oracle Health Sciences InForm Publisher)
6.3.1.1 (Oracle Health Sciences InForm Publisher)
до 2.5 (ОСОН ОСнова Оnyx)
2.1 (ROSA Virtualization)
3.0 (ROSA Virtualization 3.0)

Тип ПО

Операционная система
Прикладное ПО информационных систем
ПО виртуализации/ПО виртуального программно-аппаратного средства
Программное средство защиты

Операционные системы и аппаратные платформы

Сообщество свободного программного обеспечения Debian GNU/Linux 9
Сообщество свободного программного обеспечения Debian GNU/Linux 10
Сообщество свободного программного обеспечения Debian GNU/Linux 11
АО «НТЦ ИТ РОСА» ROSA Virtualization 2.1
АО «НТЦ ИТ РОСА» ROSA Virtualization 3.0 3.0

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 5,4)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,9)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для OpenSSL:
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
Для NetApp Inc:
https://security.netapp.com/advisory/ntap-20220204-0005/
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2021-4160
https://www.debian.org/security/2022/dsa-5103
Для программных продуктов Oracle Corp.:
https://www.oracle.com/security-alerts/cpuapr2022.html
Для ОСОН Основа:
Обновление программного обеспечения openssl до версии 1.1.1n-0+deb10u2
Для программной системы управления средой виртуализации с подсистемой безагентного резервного копирования виртуальных машин «ROSA Virtualization 3.0»: https://abf.rosa.ru/advisories/ROSA-SA-2025-2858
Для системы управления средой виртуализации «ROSA Virtualization»: https://abf.rosa.ru/advisories/ROSA-SA-2025-2857

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 53%
0.00299
Низкий

5.9 Medium

CVSS3

5.4 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 4 лет назад

There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and 3.0.1 on the 15th of December 2021. F...

CVSS3: 5.9
redhat
около 4 лет назад

There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and 3.0.1 on the 15th of December 2021. F...

CVSS3: 5.9
nvd
около 4 лет назад

There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and 3.0.1 on the 15th of December 2021. For

CVSS3: 5.9
msrc
почти 4 года назад

Описание отсутствует

CVSS3: 5.9
debian
около 4 лет назад

There is a carry propagation bug in the MIPS32 and MIPS64 squaring pro ...

EPSS

Процентиль: 53%
0.00299
Низкий

5.9 Medium

CVSS3

5.4 Medium

CVSS2