Количество 22
Количество 22
CVE-2019-1547
Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A...
CVE-2019-1547
Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A...
CVE-2019-1547
Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affe
CVE-2019-1547
ECDSA remote timing attack
CVE-2019-1547
Normally in OpenSSL EC groups always have a co-factor present and this ...
GHSA-q2qv-648h-wcqp
Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A...
BDU:2019-04084
Уязвимость функций ec_err.c и ec_lib.c библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
openSUSE-SU-2019:2269-1
Security update for openssl-1_0_0
openSUSE-SU-2019:2268-1
Security update for openssl-1_0_0
openSUSE-SU-2019:2189-1
Security update for openssl-1_1
openSUSE-SU-2019:2158-1
Security update for openssl-1_1
SUSE-SU-2019:2561-1
Security update for openssl-1_0_0
SUSE-SU-2019:2558-1
Security update for compat-openssl098
SUSE-SU-2019:2504-1
Security update for openssl-1_0_0
SUSE-SU-2019:2413-1
Security update for openssl
SUSE-SU-2019:2410-1
Security update for openssl-1_1
SUSE-SU-2019:2403-1
Security update for openssl-1_1
SUSE-SU-2019:2397-1
Security update for openssl
SUSE-SU-2019:14174-1
Security update for openssl
SUSE-SU-2019:14171-1
Security update for openssl1
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-1547 Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A... | CVSS3: 4.7 | 0% Низкий | больше 6 лет назад | |
CVE-2019-1547 Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A... | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад | |
CVE-2019-1547 Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affe | CVSS3: 4.7 | 0% Низкий | больше 6 лет назад | |
CVE-2019-1547 ECDSA remote timing attack | 0% Низкий | 5 месяцев назад | ||
CVE-2019-1547 Normally in OpenSSL EC groups always have a co-factor present and this ... | CVSS3: 4.7 | 0% Низкий | больше 6 лет назад | |
GHSA-q2qv-648h-wcqp Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (A... | CVSS3: 4.7 | 0% Низкий | больше 3 лет назад | |
BDU:2019-04084 Уязвимость функций ec_err.c и ec_lib.c библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 4.7 | 0% Низкий | больше 6 лет назад | |
openSUSE-SU-2019:2269-1 Security update for openssl-1_0_0 | больше 6 лет назад | |||
openSUSE-SU-2019:2268-1 Security update for openssl-1_0_0 | больше 6 лет назад | |||
openSUSE-SU-2019:2189-1 Security update for openssl-1_1 | больше 6 лет назад | |||
openSUSE-SU-2019:2158-1 Security update for openssl-1_1 | больше 6 лет назад | |||
SUSE-SU-2019:2561-1 Security update for openssl-1_0_0 | больше 6 лет назад | |||
SUSE-SU-2019:2558-1 Security update for compat-openssl098 | больше 6 лет назад | |||
SUSE-SU-2019:2504-1 Security update for openssl-1_0_0 | больше 6 лет назад | |||
SUSE-SU-2019:2413-1 Security update for openssl | больше 6 лет назад | |||
SUSE-SU-2019:2410-1 Security update for openssl-1_1 | больше 6 лет назад | |||
SUSE-SU-2019:2403-1 Security update for openssl-1_1 | больше 6 лет назад | |||
SUSE-SU-2019:2397-1 Security update for openssl | больше 6 лет назад | |||
SUSE-SU-2019:14174-1 Security update for openssl | больше 6 лет назад | |||
SUSE-SU-2019:14171-1 Security update for openssl1 | больше 6 лет назад |
Уязвимостей на страницу