TROYANOSYVIRUS
Retour aux CVEs

CVE-2019-1547

MEDIUM
4.7

Description

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

Details CVE

Score CVSS v3.14.7
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Vecteur d'attaqueLOCAL
ComplexiteHIGH
Privileges requisLOW
Interaction utilisateurNONE
Publie9/10/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0

Produits affectes

openssl:openssl

References

https://arxiv.org/abs/1909.01785(openssl-security@openssl.org)
https://seclists.org/bugtraq/2019/Oct/0(openssl-security@openssl.org)
https://seclists.org/bugtraq/2019/Oct/1(openssl-security@openssl.org)
https://seclists.org/bugtraq/2019/Sep/25(openssl-security@openssl.org)
https://security.gentoo.org/glsa/201911-04(openssl-security@openssl.org)
https://usn.ubuntu.com/4376-1/(openssl-security@openssl.org)
https://usn.ubuntu.com/4376-2/(openssl-security@openssl.org)
https://usn.ubuntu.com/4504-1/(openssl-security@openssl.org)
https://www.debian.org/security/2019/dsa-4539(openssl-security@openssl.org)
https://www.debian.org/security/2019/dsa-4540(openssl-security@openssl.org)
https://www.tenable.com/security/tns-2019-08(openssl-security@openssl.org)
https://www.tenable.com/security/tns-2019-09(openssl-security@openssl.org)
https://arxiv.org/abs/1909.01785(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Oct/0(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Oct/1(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Sep/25(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201911-04(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190919-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20200122-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20200416-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20240621-0006/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4376-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4376-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4504-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4539(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4540(af854a3a-2127-422b-91ae-364da2661108)
https://www.openssl.org/news/secadv/20190910.txt(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2019-08(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2019-09(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.