Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2010-0928

Опубликовано: 05 мар. 2010
Источник: nvd
CVSS2: 4
EPSS Низкий

Описание

OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:gaisler:leon3_soc:*:*:*:*:*:*:*:*
cpe:2.3:h:xilinx:virtex-ii_pro_fpga:*:*:*:*:*:*:*:*

EPSS

Процентиль: 27%
0.00094
Низкий

4 Medium

CVSS2

Дефекты

CWE-310

Связанные уязвимости

ubuntu
почти 16 лет назад

OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."

redhat
почти 16 лет назад

OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."

debian
почти 16 лет назад

OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex- ...

github
почти 4 года назад

OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."

EPSS

Процентиль: 27%
0.00094
Низкий

4 Medium

CVSS2

Дефекты

CWE-310