Логотип exploitDog
bind:"CVE-2016-7055"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2016-7055"

Количество 13

Количество 13

ubuntu логотип

CVE-2016-7055

около 8 лет назад

There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clien...

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2016-7055

больше 8 лет назад

There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clien...

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2016-7055

около 8 лет назад

There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2016-7055

около 8 лет назад

There is a carry propagating bug in the Broadwell-specific Montgomery ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-hxpw-pxmm-q49r

около 3 лет назад

There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clien...

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2020-02907

около 8 лет назад

Уязвимость реализации алгоритма умножения Монтгомери библиотеки OpenSSL, связанная с ошибкой управления ключами , позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.9
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:0941-1

около 8 лет назад

Security update for nodejs4

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:0527-1

больше 8 лет назад

Security update for nodejs

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:0481-1

больше 8 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:0855-1

около 8 лет назад

Security update for nodejs4

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:0441-1

больше 8 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:0431-1

больше 8 лет назад

Security update for nodejs6

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0458-1

больше 7 лет назад

Security update for openssl-steam

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2016-7055

There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clien...

CVSS3: 5.9
10%
Низкий
около 8 лет назад
redhat логотип
CVE-2016-7055

There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clien...

CVSS3: 3.7
10%
Низкий
больше 8 лет назад
nvd логотип
CVE-2016-7055

There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients

CVSS3: 5.9
10%
Низкий
около 8 лет назад
debian логотип
CVE-2016-7055

There is a carry propagating bug in the Broadwell-specific Montgomery ...

CVSS3: 5.9
10%
Низкий
около 8 лет назад
github логотип
GHSA-hxpw-pxmm-q49r

There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clien...

CVSS3: 5.9
10%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-02907

Уязвимость реализации алгоритма умножения Монтгомери библиотеки OpenSSL, связанная с ошибкой управления ключами , позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.9
10%
Низкий
около 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:0941-1

Security update for nodejs4

около 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:0527-1

Security update for nodejs

больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:0481-1

Security update for openssl

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:0855-1

Security update for nodejs4

около 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:0441-1

Security update for openssl

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:0431-1

Security update for nodejs6

больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0458-1

Security update for openssl-steam

больше 7 лет назад

Уязвимостей на страницу