Lucene search

K
freebsdFreeBSDCCEFAC3E-2AED-11E3-AF10-000C29789CB5
HistoryOct 01, 2013 - 12:00 a.m.

polarssl -- Timing attack against protected RSA-CRT implementation

2013-10-0100:00:00
vuxml.freebsd.org
24

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

EPSS

0.005

Percentile

75.4%

PolarSSL Project reports:

The researchers Cyril Arnaud and Pierre-Alain Fouque
investigated the PolarSSL RSA implementation and discovered
a bias in the implementation of the Montgomery multiplication
that we used. For which they then show that it can be used to
mount an attack on the RSA key. Although their test attack is
done on a local system, there seems to be enough indication
that this can properly be performed from a remote system as
well.
All versions prior to PolarSSL 1.2.9 and 1.3.0 are affected
if a third party can send arbitrary handshake messages to your
server.
If correctly executed, this attack reveals the entire private
RSA key after a large number of attack messages (> 600.000 on
a local machine) are sent to show the timing differences.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchpolarssl< 1.2.9UNKNOWN

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

EPSS

0.005

Percentile

75.4%