Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-0702

Опубликовано: 03 мар. 2016
Источник: ubuntu
Приоритет: low
CVSS2: 1.9
CVSS3: 5.1

Описание

The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.

РелизСтатусПримечание
artful

released

1.0.2g-1ubuntu2
bionic

released

1.0.2g-1ubuntu2
cosmic

released

1.0.2g-1ubuntu2
devel

released

1.0.2g-1ubuntu2
disco

released

1.0.2g-1ubuntu2
esm-infra-legacy/trusty

not-affected

1.0.1f-1ubuntu2.18
esm-infra/bionic

not-affected

1.0.2g-1ubuntu2
esm-infra/xenial

not-affected

1.0.2g-1ubuntu2
precise

released

1.0.1-4ubuntu5.35
precise/esm

not-affected

1.0.1-4ubuntu5.35

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

ignored

end of standard support
trusty/esm

DNE

trusty was needed

Показывать по

1.9 Low

CVSS2

5.1 Medium

CVSS3

Связанные уязвимости

redhat
больше 9 лет назад

The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.

CVSS3: 5.1
nvd
больше 9 лет назад

The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.

CVSS3: 5.1
debian
больше 9 лет назад

The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in O ...

CVSS3: 5.1
github
около 3 лет назад

The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.

fstec
больше 9 лет назад

Уязвимость библиотеки OpenSSL, позволяющая нарушителю раскрыть RSA-ключи

1.9 Low

CVSS2

5.1 Medium

CVSS3