MitM attack in OpenSSL

Published: 2017-11-02 18:21:15
Severity Low
Patch available YES
Number of vulnerabilities 1
CVSSv2 1.9 (AV:N/AC:H/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
CVSSv3 5 [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE ID CVE-2017-3736
CWE ID CWE-310
Exploitation vector Network
Public exploit Not available
Vulnerable software OpenSSL
Vulnerable software versions OpenSSL 1.0.2l
OpenSSL 1.0.2k
OpenSSL 1.0.2j
Show more
Vendor URL OpenSSL Software Foundation
Advisory type Public

Security Advisory

1) Carry propagation issue

Description

The vulnerability allows a remote attacker to decrypt data.

The vulnerability exists due to carry propagating bug in the x86_64 Montgomery squaring procedure (bn_sqrx8x_internal). A remote attacker can decrypt encrypted data. The vulnerability affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.

Remediation

Update to version 1.0.2m or 1.1.0g.

External links

https://www.openssl.org/news/secadv/20171102.txt

Back to List