Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p73v-qh88-fqc2

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.

MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.

EPSS

Процентиль: 50%
0.00272
Низкий

Дефекты

CWE-327

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 6 лет назад

MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.

CVSS3: 5.9
nvd
больше 6 лет назад

MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.

CVSS3: 5.9
debian
больше 6 лет назад

MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA si ...

EPSS

Процентиль: 50%
0.00272
Низкий

Дефекты

CWE-327