The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://advisories.mageia.org/MGASA-2014-0165.html - | |
References | () http://eprint.iacr.org/2014/140 - | |
References | () http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2198be3483259de374f91e57d247d0fc667aef29 - | |
References | () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2014-04/msg00007.html - | |
References | () http://marc.info/?l=bugtraq&m=140266410314613&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=140317760000786&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=140389274407904&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=140389355508263&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=140448122410568&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=140482916501310&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=140621259019789&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=140752315422991&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=140904544427729&w=2 - | |
References | () http://secunia.com/advisories/58492 - | |
References | () http://secunia.com/advisories/58727 - | |
References | () http://secunia.com/advisories/58939 - | |
References | () http://secunia.com/advisories/59040 - | |
References | () http://secunia.com/advisories/59162 - | |
References | () http://secunia.com/advisories/59175 - | |
References | () http://secunia.com/advisories/59264 - | |
References | () http://secunia.com/advisories/59300 - | |
References | () http://secunia.com/advisories/59364 - | |
References | () http://secunia.com/advisories/59374 - | |
References | () http://secunia.com/advisories/59413 - | |
References | () http://secunia.com/advisories/59438 - | |
References | () http://secunia.com/advisories/59445 - | |
References | () http://secunia.com/advisories/59450 - | |
References | () http://secunia.com/advisories/59454 - | |
References | () http://secunia.com/advisories/59490 - | |
References | () http://secunia.com/advisories/59495 - | |
References | () http://secunia.com/advisories/59514 - | |
References | () http://secunia.com/advisories/59655 - | |
References | () http://secunia.com/advisories/59721 - | |
References | () http://secunia.com/advisories/60571 - | |
References | () http://support.apple.com/kb/HT6443 - | |
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=isg400001841 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=isg400001843 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21673137 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21676035 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21676062 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21676092 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21676419 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21676424 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21676501 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21676655 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21677695 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21677828 - | |
References | () http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2014:067 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 - | |
References | () http://www.novell.com/support/kb/doc.php?id=7015264 - | |
References | () http://www.novell.com/support/kb/doc.php?id=7015300 - | |
References | () http://www.openssl.org/news/secadv_20140605.txt - | |
References | () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - | |
References | () http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - | |
References | () http://www.securityfocus.com/bid/66363 - | |
References | () http://www.ubuntu.com/usn/USN-2165-1 - | |
References | () https://bugs.gentoo.org/show_bug.cgi?id=505278 - | |
References | () https://bugzilla.novell.com/show_bug.cgi?id=869945 - | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 - | |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10075 - |
Information
Published : 2014-03-25 13:25
Updated : 2024-11-21 02:01
NVD link : CVE-2014-0076
Mitre link : CVE-2014-0076
CVE.ORG link : CVE-2014-0076
JSON object : View
Products Affected
openssl
- openssl
CWE
CWE-310
Cryptographic Issues