SB2019120803 - Private key recovery in crypto++



SB2019120803 - Private key recovery in crypto++

Published: December 8, 2019 Updated: January 3, 2021

Security Bulletin ID SB2019120803
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Covert Timing Channel (CVE-ID: CVE-2019-14318)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (binary field curves, large leakage) is not constant time and leaks the bit length of the scalar among other information within the timing side channel in ECDSA signature generation. A local user with ability to measure the duration of hundreds to thousands of signing operations can compute the private key used.


Remediation

Install update from vendor's website.