CVE-2015-3193

Impact:
Moderate
Public Date:
2015-12-03
IAVA:
2016-A-0030, 2016-A-0293
Bugzilla:
1288317: CVE-2015-3193 OpenSSL: BN_mod_exp may produce incorrect results on x86_64

The MITRE CVE dictionary describes this issue as:

The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.

Find out more about CVE-2015-3193 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue does not affect the version of OpenSSL as shipped with Red Hat Enterprise Linux 5, 6 and 7.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 2.6
Base Metrics AV:N/AC:H/Au:N/C:P/I:N/A:N
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation