Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

CVE-2019-1551

PUBLISHED 16.09.2024

CNA: openssl

rsaz_512_sqr overflow bug on x86_64

Обновлено: 17.03.2022
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).

БДУ ФСТЭК

Идентификатор Описание
BDU:2020-00300 Уязвимость функции PA-RISC CRYPTO_memcmp библиотеки OpenSSL, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

Доп. Информация

Product Status

OpenSSL
Product: OpenSSL
Vendor: OpenSSL
Default status: Не определен
Версии:
Затронутые версии Статус
Наблюдалось в версии Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d) affected
Наблюдалось в версии Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t) affected
 

Ссылки

https://seclists.org/bugtraq/2019/Dec/39
https://www.debian.org/security/2019/dsa-4594
https://seclists.org/bugtraq/2019/Dec/46
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
https://security.gentoo.org/glsa/202004-10
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDB...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPY...
https://usn.ubuntu.com/4376-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.tenable.com/security/tns-2019-09
https://www.openssl.org/news/secadv/20191206.txt
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=419102400a2811582a7a3d4a4e317d72e5ce0a8f
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f1c5eea8a817075d31e43f5876993c6710238c98
https://security.netapp.com/advisory/ntap-20191210-0001/
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
https://www.tenable.com/security/tns-2020-03
https://usn.ubuntu.com/4504-1/
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.tenable.com/security/tns-2020-11
https://www.debian.org/security/2021/dsa-4855
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.tenable.com/security/tns-2021-10
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html

CVE Program Container

Обновлено: 04.08.2024
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

Ссылки

https://seclists.org/bugtraq/2019/Dec/39
https://www.debian.org/security/2019/dsa-4594
https://seclists.org/bugtraq/2019/Dec/46
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
https://security.gentoo.org/glsa/202004-10
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDB...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPY...
https://usn.ubuntu.com/4376-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.tenable.com/security/tns-2019-09
https://www.openssl.org/news/secadv/20191206.txt
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=419102400a2811582a7a3d4a4e317d72e5ce0a8f
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f1c5eea8a817075d31e43f5876993c6710238c98
https://security.netapp.com/advisory/ntap-20191210-0001/
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
https://www.tenable.com/security/tns-2020-03
https://usn.ubuntu.com/4504-1/
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.tenable.com/security/tns-2020-11
https://www.debian.org/security/2021/dsa-4855
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.tenable.com/security/tns-2021-10
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.