Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-1551

Опубликовано: 06 дек. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5
CVSS3: 5.3

Описание

There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).

РелизСтатусПримечание
bionic

not-affected

code not built
devel

not-affected

code not built
disco

ignored

end of life
eoan

not-affected

code not built
esm-apps/bionic

not-affected

code not built
esm-apps/xenial

not-affected

code not built
esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

code not built
focal

not-affected

code not built
precise/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl1.1
disco

not-affected

uses system openssl1.1
eoan

not-affected

uses system openssl1.1
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl1.1
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl1.1
precise/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

released

1.1.1-1ubuntu2.1~18.04.6
devel

released

1.1.1f-1ubuntu1
disco

ignored

end of life
eoan

released

1.1.1c-1ubuntu4.1
esm-infra-legacy/trusty

not-affected

esm-infra/bionic

released

1.1.1-1ubuntu2.1~18.04.6
esm-infra/focal

released

1.1.1f-1ubuntu1
esm-infra/xenial

released

1.0.2g-1ubuntu4.16
focal

released

1.1.1f-1ubuntu1
precise/esm

not-affected

Показывать по

РелизСтатусПримечание
bionic

released

1.0.2n-1ubuntu5.4
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

1.0.2n-1ubuntu5.4
esm-infra/focal

DNE

focal

DNE

precise/esm

DNE

trusty

DNE

Показывать по

EPSS

Процентиль: 89%
0.0453
Низкий

5 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.8
redhat
почти 6 лет назад

There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).

CVSS3: 5.3
nvd
почти 6 лет назад

There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).

CVSS3: 5.3
debian
почти 6 лет назад

There is an overflow bug in the x64_64 Montgomery squaring procedure u ...

suse-cvrf
почти 6 лет назад

Security update for openssl-1_1

suse-cvrf
больше 5 лет назад

Security update for openssl

EPSS

Процентиль: 89%
0.0453
Низкий

5 Medium

CVSS2

5.3 Medium

CVSS3

Уязвимость CVE-2019-1551