Логотип exploitDog
bind:CVE-2019-13628
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-13628

Количество 4

Количество 4

ubuntu логотип

CVE-2019-13628

больше 6 лет назад

wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2019-13628

больше 6 лет назад

wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2019-13628

больше 6 лет назад

wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --ena ...

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-q95h-vc86-hv77

больше 3 лет назад

wolfCrypt leaks cryptographic information via timing side channel

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-13628

wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.

CVSS3: 4.7
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-13628

wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.

CVSS3: 4.7
0%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-13628

wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --ena ...

CVSS3: 4.7
0%
Низкий
больше 6 лет назад
github логотип
GHSA-q95h-vc86-hv77

wolfCrypt leaks cryptographic information via timing side channel

CVSS3: 4.7
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу