Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-1547

Опубликовано: 10 сент. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 1.9
CVSS3: 4.7

Описание

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A...

РелизСтатусПримечание
bionic

not-affected

code not built
devel

not-affected

code not built
disco

not-affected

code not built
eoan

not-affected

code not built
esm-apps/bionic

not-affected

code not built
esm-apps/xenial

not-affected

code not built
esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

code not built
focal

not-affected

code not built
precise/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl1.1
disco

not-affected

uses system openssl1.1
eoan

not-affected

uses system openssl1.1
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl1.1
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl1.1
precise/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

released

1.1.1-1ubuntu2.1~18.04.6
devel

released

1.1.1d-2ubuntu1
disco

ignored

end of life
eoan

released

1.1.1c-1ubuntu4.1
esm-infra-legacy/trusty

released

1.0.1f-1ubuntu2.27+esm1
esm-infra/bionic

released

1.1.1-1ubuntu2.1~18.04.6
esm-infra/focal

released

1.1.1d-2ubuntu1
esm-infra/xenial

released

1.0.2g-1ubuntu4.16
focal

released

1.1.1d-2ubuntu1
precise/esm

not-affected

1.0.1-4ubuntu5.44

Показывать по

РелизСтатусПримечание
bionic

released

1.0.2n-1ubuntu5.4
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

1.0.2n-1ubuntu5.4
esm-infra/focal

DNE

focal

DNE

precise/esm

DNE

trusty

DNE

Показывать по

EPSS

Процентиль: 49%
0.0026
Низкий

1.9 Low

CVSS2

4.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
redhat
больше 6 лет назад

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A...

CVSS3: 4.7
nvd
больше 6 лет назад

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affe

msrc
5 месяцев назад

ECDSA remote timing attack

CVSS3: 4.7
debian
больше 6 лет назад

Normally in OpenSSL EC groups always have a co-factor present and this ...

CVSS3: 4.7
github
больше 3 лет назад

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A...

EPSS

Процентиль: 49%
0.0026
Низкий

1.9 Low

CVSS2

4.7 Medium

CVSS3