Логотип exploitDog
bind:"BDU:2021-03037" OR bind:"CVE-2017-3738"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2021-03037" OR bind:"CVE-2017-3738"

Количество 14

Количество 14

fstec логотип

BDU:2021-03037

больше 7 лет назад

Уязвимость процедуры AVX2 Montgomery библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
EPSS: Средний
ubuntu логотип

CVE-2017-3738

больше 7 лет назад

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to th...

CVSS3: 5.9
EPSS: Средний
redhat логотип

CVE-2017-3738

больше 7 лет назад

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to th...

CVSS3: 5.9
EPSS: Средний
nvd логотип

CVE-2017-3738

больше 7 лет назад

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the l

CVSS3: 5.9
EPSS: Средний
debian логотип

CVE-2017-3738

больше 7 лет назад

There is an overflow bug in the AVX2 Montgomery multiplication procedu ...

CVSS3: 5.9
EPSS: Средний
github логотип

GHSA-gj3m-w8pf-46c5

около 3 лет назад

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to th...

CVSS3: 5.9
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2017:3345-1

больше 7 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:3343-1

больше 7 лет назад

Security update for openssl

EPSS: Низкий
oracle-oval логотип

ELSA-2018-0998

около 7 лет назад

ELSA-2018-0998: openssl security and bug fix update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0315-1

больше 7 лет назад

Security update for nodejs6

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0029-1

больше 7 лет назад

Security update for nodejs4

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0293-1

больше 7 лет назад

Security update for nodejs6

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0002-1

больше 7 лет назад

Security update for nodejs4

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14246-1

больше 5 лет назад

Security update for Mozilla Firefox

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2021-03037

Уязвимость процедуры AVX2 Montgomery библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
18%
Средний
больше 7 лет назад
ubuntu логотип
CVE-2017-3738

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to th...

CVSS3: 5.9
18%
Средний
больше 7 лет назад
redhat логотип
CVE-2017-3738

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to th...

CVSS3: 5.9
18%
Средний
больше 7 лет назад
nvd логотип
CVE-2017-3738

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the l

CVSS3: 5.9
18%
Средний
больше 7 лет назад
debian логотип
CVE-2017-3738

There is an overflow bug in the AVX2 Montgomery multiplication procedu ...

CVSS3: 5.9
18%
Средний
больше 7 лет назад
github логотип
GHSA-gj3m-w8pf-46c5

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to th...

CVSS3: 5.9
18%
Средний
около 3 лет назад
suse-cvrf логотип
openSUSE-SU-2017:3345-1

Security update for openssl

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2017:3343-1

Security update for openssl

больше 7 лет назад
oracle-oval логотип
ELSA-2018-0998

ELSA-2018-0998: openssl security and bug fix update (MODERATE)

около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0315-1

Security update for nodejs6

больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0029-1

Security update for nodejs4

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:0293-1

Security update for nodejs6

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:0002-1

Security update for nodejs4

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:14246-1

Security update for Mozilla Firefox

больше 5 лет назад

Уязвимостей на страницу