Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-4354

Опубликовано: 27 янв. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.8

Описание

crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.

РелизСтатусПримечание
devel

not-affected

hardy

released

0.9.8g-4ubuntu3.15
lucid

not-affected

0.9.8k-7ubuntu8.6
maverick

not-affected

natty

not-affected

oneiric

not-affected

upstream

released

0.9.8h

Показывать по

EPSS

Процентиль: 45%
0.00226
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

redhat
около 14 лет назад

crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.

nvd
около 14 лет назад

crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.

debian
около 14 лет назад

crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as u ...

github
больше 3 лет назад

crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.

EPSS

Процентиль: 45%
0.00226
Низкий

5.8 Medium

CVSS2