Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-0735

Опубликовано: 25 окт. 2018
Источник: redhat
CVSS3: 5.1
EPSS Низкий

Описание

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5opensslNot affected
Red Hat Enterprise Linux 6opensslWill not fix
Red Hat Enterprise Linux 6openssl098eNot affected
Red Hat Enterprise Linux 7openssl098eNot affected
Red Hat Enterprise Linux 7OVMFWill not fix
Red Hat Enterprise Linux 8compat-openssl10Not affected
Red Hat Enterprise Linux 8mingw-opensslNot affected
Red Hat JBoss Core ServicesopensslNot affected
Red Hat JBoss Enterprise Application Platform 5opensslNot affected
Red Hat JBoss Enterprise Application Platform 6opensslNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-385
https://bugzilla.redhat.com/show_bug.cgi?id=1644356openssl: timing side channel attack in the ECDSA signature generation

EPSS

Процентиль: 91%
0.07652
Низкий

5.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 6 лет назад

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.9
nvd
больше 6 лет назад

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.9
debian
больше 6 лет назад

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable ...

CVSS3: 5.9
github
около 3 лет назад

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.9
fstec
больше 6 лет назад

Уязвимость реализации алгоритма шифрования ECDSA библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 91%
0.07652
Низкий

5.1 Medium

CVSS3