Vulnerability Description
The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openssl | Openssl | 1.0.2 |
| Nodejs | Node.Js | >= 4.0.0, <= 4.1.2 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://fortiguard.com/advisory/openssl-advisory-december-2015Third Party Advisory
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759Third Party Advisory
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761Third Party Advisory
- http://openssl.org/news/secadv/20151203.txtVendor Advisory
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20Third Party Advisory
- http://www.fortiguard.com/advisory/openssl-advisory-december-2015Third Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlPatchThird Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlPatchThird Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlPatchThird Party Advisory
- http://www.securityfocus.com/bid/78705Third Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/91787Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1034294Third Party AdvisoryVDB Entry
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackThird Party Advisory
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackThird Party Advisory
- http://www.ubuntu.com/usn/USN-2830-1Third Party Advisory
FAQ
What is CVE-2015-3193?
CVE-2015-3193 is a vulnerability with a CVSS score of 7.5 (HIGH). The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and prod...
How severe is CVE-2015-3193?
CVE-2015-3193 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3193?
Check the references section above for vendor advisories and patch information. Affected products include: Openssl Openssl, Nodejs Node.Js, Canonical Ubuntu Linux.