Vulnerability Description
MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Matrixssl | Matrixssl | <= 4.2.1 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2019/10/02/2Mailing ListThird Party Advisory
- https://eprint.iacr.org/2011/232.pdfNot Applicable
- https://minerva.crocs.fi.muni.cz/Product
- https://tches.iacr.org/index.php/TCHES/article/view/7337Not Applicable
- http://www.openwall.com/lists/oss-security/2019/10/02/2Mailing ListThird Party Advisory
- https://eprint.iacr.org/2011/232.pdfNot Applicable
- https://minerva.crocs.fi.muni.cz/Product
- https://tches.iacr.org/index.php/TCHES/article/view/7337Not Applicable
FAQ
What is CVE-2019-13629?
CVE-2019-13629 is a vulnerability with a CVSS score of 5.9 (MEDIUM). MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing ope...
How severe is CVE-2019-13629?
CVE-2019-13629 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-13629?
Check the references section above for vendor advisories and patch information. Affected products include: Matrixssl Matrixssl.