Vulnerabilidad en la implementación Montgomery ladder en OpenSSL (CVE-2014-0076)
Gravedad CVSS v2.0:
BAJA
Tipo:
CWE-310
Errores criptográficos
Fecha de publicación:
25/03/2014
Última modificación:
12/04/2025
Descripción
La implementación de la escala Montgomery en OpenSSL hasta la versión 1.0.0l no asegura que ciertas operaciones de intercambio tengan un comportamiento constante en el tiempo, lo que facilita a usuarios locales obtener nonces ECDSA a través de un ataque de caché de canal lateral FLUSH+RELOAD.
Impacto
Puntuación base 2.0
1.90
Gravedad 2.0
BAJA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 1.0.0l (incluyendo) | |
| cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://advisories.mageia.org/MGASA-2014-0165.html
- http://eprint.iacr.org/2014/140
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommit%3Bh%3D2198be3483259de374f91e57d247d0fc667aef29
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00007.html
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140317760000786&w=2
- http://marc.info/?l=bugtraq&m=140389274407904&w=2
- http://marc.info/?l=bugtraq&m=140389355508263&w=2
- http://marc.info/?l=bugtraq&m=140448122410568&w=2
- http://marc.info/?l=bugtraq&m=140482916501310&w=2
- http://marc.info/?l=bugtraq&m=140621259019789&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- http://marc.info/?l=bugtraq&m=140904544427729&w=2
- http://secunia.com/advisories/58492
- http://secunia.com/advisories/58727
- http://secunia.com/advisories/58939
- http://secunia.com/advisories/59040
- http://secunia.com/advisories/59162
- http://secunia.com/advisories/59175
- http://secunia.com/advisories/59264
- http://secunia.com/advisories/59300
- http://secunia.com/advisories/59364
- http://secunia.com/advisories/59374
- http://secunia.com/advisories/59413
- http://secunia.com/advisories/59438
- http://secunia.com/advisories/59445
- http://secunia.com/advisories/59450
- http://secunia.com/advisories/59454
- http://secunia.com/advisories/59490
- http://secunia.com/advisories/59495
- http://secunia.com/advisories/59514
- http://secunia.com/advisories/59655
- http://secunia.com/advisories/59721
- http://secunia.com/advisories/60571
- http://support.apple.com/kb/HT6443
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://www-01.ibm.com/support/docview.wss?uid=swg21676092
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21676424
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A067
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A062
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.openssl.org/news/secadv_20140605.txt
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/bid/66363
- http://www.ubuntu.com/usn/USN-2165-1
- https://bugs.gentoo.org/show_bug.cgi?id=505278
- https://bugzilla.novell.com/show_bug.cgi?id=869945
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- http://advisories.mageia.org/MGASA-2014-0165.html
- http://eprint.iacr.org/2014/140
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommit%3Bh%3D2198be3483259de374f91e57d247d0fc667aef29
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00007.html
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140317760000786&w=2
- http://marc.info/?l=bugtraq&m=140389274407904&w=2
- http://marc.info/?l=bugtraq&m=140389355508263&w=2
- http://marc.info/?l=bugtraq&m=140448122410568&w=2
- http://marc.info/?l=bugtraq&m=140482916501310&w=2
- http://marc.info/?l=bugtraq&m=140621259019789&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- http://marc.info/?l=bugtraq&m=140904544427729&w=2
- http://secunia.com/advisories/58492
- http://secunia.com/advisories/58727
- http://secunia.com/advisories/58939
- http://secunia.com/advisories/59040
- http://secunia.com/advisories/59162
- http://secunia.com/advisories/59175
- http://secunia.com/advisories/59264
- http://secunia.com/advisories/59300
- http://secunia.com/advisories/59364
- http://secunia.com/advisories/59374
- http://secunia.com/advisories/59413
- http://secunia.com/advisories/59438
- http://secunia.com/advisories/59445
- http://secunia.com/advisories/59450
- http://secunia.com/advisories/59454
- http://secunia.com/advisories/59490
- http://secunia.com/advisories/59495
- http://secunia.com/advisories/59514
- http://secunia.com/advisories/59655
- http://secunia.com/advisories/59721
- http://secunia.com/advisories/60571
- http://support.apple.com/kb/HT6443
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://www-01.ibm.com/support/docview.wss?uid=swg21676092
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21676424
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A067
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A062
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.openssl.org/news/secadv_20140605.txt
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/bid/66363
- http://www.ubuntu.com/usn/USN-2165-1
- https://bugs.gentoo.org/show_bug.cgi?id=505278
- https://bugzilla.novell.com/show_bug.cgi?id=869945
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075



