Логотип exploitDog
bind:CVE-2019-1547
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1547

Количество 22

Количество 22

ubuntu логотип

CVE-2019-1547

больше 6 лет назад

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A...

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2019-1547

больше 6 лет назад

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A...

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2019-1547

больше 6 лет назад

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affe

CVSS3: 4.7
EPSS: Низкий
msrc логотип

CVE-2019-1547

5 месяцев назад

ECDSA remote timing attack

EPSS: Низкий
debian логотип

CVE-2019-1547

больше 6 лет назад

Normally in OpenSSL EC groups always have a co-factor present and this ...

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-q2qv-648h-wcqp

больше 3 лет назад

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A...

CVSS3: 4.7
EPSS: Низкий
fstec логотип

BDU:2019-04084

больше 6 лет назад

Уязвимость функций ec_err.c и ec_lib.c библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 4.7
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2269-1

больше 6 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2268-1

больше 6 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2189-1

больше 6 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2158-1

больше 6 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2561-1

больше 6 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2558-1

больше 6 лет назад

Security update for compat-openssl098

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2504-1

больше 6 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2413-1

больше 6 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2410-1

больше 6 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2403-1

больше 6 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2397-1

больше 6 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14174-1

больше 6 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14171-1

больше 6 лет назад

Security update for openssl1

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-1547

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A...

CVSS3: 4.7
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-1547

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A...

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-1547

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affe

CVSS3: 4.7
0%
Низкий
больше 6 лет назад
msrc логотип
CVE-2019-1547

ECDSA remote timing attack

0%
Низкий
5 месяцев назад
debian логотип
CVE-2019-1547

Normally in OpenSSL EC groups always have a co-factor present and this ...

CVSS3: 4.7
0%
Низкий
больше 6 лет назад
github логотип
GHSA-q2qv-648h-wcqp

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A...

CVSS3: 4.7
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-04084

Уязвимость функций ec_err.c и ec_lib.c библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 4.7
0%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2269-1

Security update for openssl-1_0_0

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2268-1

Security update for openssl-1_0_0

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2189-1

Security update for openssl-1_1

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2158-1

Security update for openssl-1_1

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2561-1

Security update for openssl-1_0_0

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2558-1

Security update for compat-openssl098

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2504-1

Security update for openssl-1_0_0

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2413-1

Security update for openssl

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2410-1

Security update for openssl-1_1

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2403-1

Security update for openssl-1_1

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2397-1

Security update for openssl

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14174-1

Security update for openssl

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14171-1

Security update for openssl1

больше 6 лет назад

Уязвимостей на страницу