CVE-2019-13629

MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.
Configurations

Configuration 1 (hide)

cpe:2.3:a:matrixssl:matrixssl:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:25

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2019/10/02/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/10/02/2 - Mailing List, Third Party Advisory
References () https://eprint.iacr.org/2011/232.pdf - Not Applicable () https://eprint.iacr.org/2011/232.pdf - Not Applicable
References () https://minerva.crocs.fi.muni.cz/ - Product () https://minerva.crocs.fi.muni.cz/ - Product
References () https://tches.iacr.org/index.php/TCHES/article/view/7337 - Not Applicable () https://tches.iacr.org/index.php/TCHES/article/view/7337 - Not Applicable

Information

Published : 2019-10-03 14:15

Updated : 2024-11-21 04:25


NVD link : CVE-2019-13629

Mitre link : CVE-2019-13629

CVE.ORG link : CVE-2019-13629


JSON object : View

Products Affected

matrixssl

  • matrixssl
CWE
CWE-203

Observable Discrepancy

CWE-327

Use of a Broken or Risky Cryptographic Algorithm