Vulnerabilites related to oracle - traffic_director
Vulnerability from fkie_nvd
Published
2013-02-08 19:55
Modified
2024-11-21 01:50
Severity ?
Summary
The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mozilla | network_security_services | * | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 11.10 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 | |
oracle | enterprise_manager_ops_center | 11.1 | |
oracle | enterprise_manager_ops_center | 12.1 | |
oracle | enterprise_manager_ops_center | 12.2 | |
oracle | glassfish_communications_server | 2.0 | |
oracle | glassfish_server | 2.1.1 | |
oracle | iplanet_web_proxy_server | 4.0 | |
oracle | iplanet_web_server | 6.1 | |
oracle | iplanet_web_server | 7.0 | |
oracle | opensso | 3.0-03 | |
oracle | traffic_director | 11.1.1.6.0 | |
oracle | traffic_director | 11.1.1.7.0 | |
oracle | vm_server | 3.2 | |
redhat | enterprise_linux_desktop | 5.0 | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_eus | 5.9 | |
redhat | enterprise_linux_server | 5.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_server_aus | 5.9 | |
redhat | enterprise_linux_workstation | 5.0 | |
redhat | enterprise_linux_workstation | 6.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", matchCriteriaId: "678B1E05-61E2-4D39-9E97-9ED904C08C64", versionEndExcluding: "3.14.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", matchCriteriaId: "01EDA41C-6B2E-49AF-B503-EB3882265C11", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", matchCriteriaId: "E4174F4F-149E-41A6-BBCC-D01114C05F38", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", matchCriteriaId: "CB66DB75-2B16-4EBF-9B93-CE49D8086E41", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", matchCriteriaId: "E2076871-2E80-4605-A470-A41C1A8EC7EE", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:enterprise_manager_ops_center:11.1:*:*:*:*:*:*:*", matchCriteriaId: "5E71A360-F385-4148-9C21-339D337EC3B2", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1:*:*:*:*:*:*:*", matchCriteriaId: "EB0370B1-0A34-4CC5-B45C-AE3A5D3ABF5A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2:*:*:*:*:*:*:*", matchCriteriaId: "D8590A7B-CDAC-43EC-9D61-6FE4F8FCEB89", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:glassfish_communications_server:2.0:*:*:*:*:*:*:*", matchCriteriaId: "B579EB86-B401-4EF5-A2EB-5A2B7DCD3664", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*", matchCriteriaId: "0E80F5AC-A2EF-4D8A-AE8F-5DD0FF9B48C2", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*", matchCriteriaId: "AE9E3545-A799-427A-8FE4-1E8231A7A284", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:iplanet_web_server:6.1:*:*:*:*:*:*:*", matchCriteriaId: "89537672-E131-4304-A7A7-D3313E3AFC24", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "A972CA67-3909-4E9A-B8FC-7AAE5126528A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:opensso:3.0-03:*:*:*:*:*:*:*", matchCriteriaId: "BD26723D-B540-4E20-ABA3-6B04AF27755F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:traffic_director:11.1.1.6.0:*:*:*:*:*:*:*", matchCriteriaId: "8934FD3F-B3FD-42F1-8804-187099C01EA7", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*", matchCriteriaId: "FEFBE568-3193-45BA-92D1-D5E47C09DDEE", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*", matchCriteriaId: "FC9E8528-0FB8-4BF0-A9EF-6CC84A2631A1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", matchCriteriaId: "133AAFA7-AF42-4D7B-8822-AA2E85611BF5", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", matchCriteriaId: "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*", matchCriteriaId: "6252E88C-27FF-420D-A64A-C34124CF7E6A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", matchCriteriaId: "54D669D4-6D7E-449D-80C1-28FA44F06FFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", matchCriteriaId: "9BBCD86A-E6C7-4444-9D74-F861084090F0", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*", matchCriteriaId: "92C9F1C4-55B0-426D-BB5E-01372C23AF97", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", matchCriteriaId: "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", matchCriteriaId: "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.", }, { lang: "es", value: "La implementación en Mozilla Network Security Services (NSS) de TLS no tiene debidamente en cuenta tiempos de canal lateral ataques a una operación de comprobación de incumplimiento MAC durante el procesamiento de malformaciones relleno CBC, que permite a atacantes remotos para realizar ataques distintivos y los ataques de recuperación de texto plano-a través de análisis estadístico de datos de tiempo de los paquetes hechos a mano, una cuestión relacionada con CVE-2013-0169.", }, ], id: "CVE-2013-1620", lastModified: "2024-11-21T01:50:00.960", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2013-02-08T19:55:01.203", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://openwall.com/lists/oss-security/2013/02/05/24", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2013-1135.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2013-1144.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://security.gentoo.org/glsa/glsa-201406-19.xml", }, { source: "cve@mitre.org", tags: [ "Technical Description", "Third Party Advisory", ], url: "http://www.isg.rhul.ac.uk/tls/TLStiming.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/57777", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/64758", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-1763-1", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://openwall.com/lists/oss-security/2013/02/05/24", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2013-1135.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2013-1144.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://security.gentoo.org/glsa/glsa-201406-19.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Technical Description", "Third Party Advisory", ], url: "http://www.isg.rhul.ac.uk/tls/TLStiming.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/57777", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/64758", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-1763-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-203", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2015-11-05 05:59
Modified
2024-11-21 02:36
Severity ?
Summary
Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | traffic_director | 11.1.1.7.0 | |
oracle | traffic_director | 11.1.1.9.0 | |
oracle | opensso | 3.0-0.7 | |
oracle | iplanet_web_proxy_server | 4.0 | |
mozilla | firefox | 38.0 | |
mozilla | firefox | 38.0.1 | |
mozilla | firefox | 38.0.5 | |
mozilla | firefox | 38.1.0 | |
mozilla | firefox | 38.1.1 | |
mozilla | firefox | 38.2.0 | |
mozilla | firefox | 38.2.1 | |
mozilla | firefox | 38.3.0 | |
oracle | glassfish_server | 2.1.1 | |
mozilla | network_security_services | * | |
mozilla | network_security_services | 3.20.0 | |
oracle | iplanet_web_server | 7.0 | |
mozilla | firefox | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*", matchCriteriaId: "FEFBE568-3193-45BA-92D1-D5E47C09DDEE", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*", matchCriteriaId: "3EB3B106-0E2D-4363-B768-4AC84F568F2A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*", matchCriteriaId: "4F9EB0C2-3654-46FD-81A0-6EF7BE87B58B", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*", matchCriteriaId: "AE9E3545-A799-427A-8FE4-1E8231A7A284", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", matchCriteriaId: "35BF0AFB-26BA-4BEA-B6B8-11CF88E951DE", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", matchCriteriaId: "1F007CC6-9391-4E1C-A747-F3DE5E572FA5", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", matchCriteriaId: "45E9641F-430C-4B3A-BD63-EC13DBD3D1E4", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", matchCriteriaId: "5AADD23B-A8AF-4679-990D-C29A1D6EB5CD", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", matchCriteriaId: "1343A1FD-98CF-4A6C-A697-1253E538FD5C", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", matchCriteriaId: "6D098567-B55E-4EAC-8FAA-31FAFDD4058F", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", matchCriteriaId: "BE0389BC-D295-4957-8AE7-EDAC770F596D", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", matchCriteriaId: "E75E69A5-AC94-4F35-9EFB-1BFF8B78210D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*", matchCriteriaId: "0E80F5AC-A2EF-4D8A-AE8F-5DD0FF9B48C2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", matchCriteriaId: "39EA735D-20A8-4595-BFF8-7B1F5A32CDA2", versionEndIncluding: "3.19.2.0", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*", matchCriteriaId: "95762E75-6DEC-4B1C-87B4-A4EA1937B710", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "A972CA67-3909-4E9A-B8FC-7AAE5126528A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", matchCriteriaId: "A741F21D-4095-47E0-AAB4-DDBDAAC5BAB1", versionEndIncluding: "41.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.", }, { lang: "es", value: "Desbordamiento de buffer basado en memoria dinámica en el decodificador ASN.1 en Mozilla Network Security Services (NSS) en versiones anteriores a 3.19.2.1 y 3.20.x en versiones anteriores a 3.20.1, como se utiliza en Firefox en versiones anteriores a 42.0 y Firefox ESR 38.x en versiones anteriores a 38.4 y otros productos, permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o posiblemente ejecutar código arbitrario a través de datos OCTET STRING manipulados.", }, ], id: "CVE-2015-7182", lastModified: "2024-11-21T02:36:17.430", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2015-11-05T05:59:06.963", references: [ { source: "security@mozilla.org", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", }, { source: "security@mozilla.org", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", }, { source: "security@mozilla.org", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", }, { source: "security@mozilla.org", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", }, { source: "security@mozilla.org", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", }, { source: "security@mozilla.org", url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", }, { source: "security@mozilla.org", url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", }, { source: "security@mozilla.org", url: "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html", }, { source: "security@mozilla.org", url: "http://rhn.redhat.com/errata/RHSA-2015-1980.html", }, { source: "security@mozilla.org", url: "http://rhn.redhat.com/errata/RHSA-2015-1981.html", }, { source: "security@mozilla.org", url: "http://www.debian.org/security/2015/dsa-3393", }, { source: "security@mozilla.org", url: "http://www.debian.org/security/2015/dsa-3410", }, { source: "security@mozilla.org", url: "http://www.debian.org/security/2016/dsa-3688", }, { source: "security@mozilla.org", tags: [ "Vendor Advisory", ], url: "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html", }, { source: "security@mozilla.org", tags: [ "Patch", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { source: "security@mozilla.org", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { source: "security@mozilla.org", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { source: "security@mozilla.org", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { source: "security@mozilla.org", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "security@mozilla.org", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { source: "security@mozilla.org", url: "http://www.securityfocus.com/bid/77416", }, { source: "security@mozilla.org", url: "http://www.securityfocus.com/bid/91787", }, { source: "security@mozilla.org", url: "http://www.securitytracker.com/id/1034069", }, { source: "security@mozilla.org", url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753", }, { source: "security@mozilla.org", url: "http://www.ubuntu.com/usn/USN-2785-1", }, { source: "security@mozilla.org", url: "http://www.ubuntu.com/usn/USN-2791-1", }, { source: "security@mozilla.org", url: "http://www.ubuntu.com/usn/USN-2819-1", }, { source: "security@mozilla.org", url: "https://bto.bluecoat.com/security-advisory/sa119", }, { source: "security@mozilla.org", url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1202868", }, { source: "security@mozilla.org", tags: [ "Vendor Advisory", ], url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes", }, { source: "security@mozilla.org", tags: [ "Vendor Advisory", ], url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes", }, { source: "security@mozilla.org", tags: [ "Vendor Advisory", ], url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes", }, { source: "security@mozilla.org", url: "https://security.gentoo.org/glsa/201512-10", }, { source: "security@mozilla.org", url: "https://security.gentoo.org/glsa/201605-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2015-1980.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2015-1981.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2015/dsa-3393", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2015/dsa-3410", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2016/dsa-3688", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/77416", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/91787", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id/1034069", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/USN-2785-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/USN-2791-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/USN-2819-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bto.bluecoat.com/security-advisory/sa119", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1202868", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201512-10", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201605-06", }, ], sourceIdentifier: "security@mozilla.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-06-13 23:29
Modified
2024-11-21 03:38
Severity ?
Summary
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnupg | libgcrypt | * | |
gnupg | libgcrypt | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
redhat | ansible_tower | 3.3 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
oracle | traffic_director | 11.1.1.9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*", matchCriteriaId: "CC274575-E019-42DC-9376-52BC58A098AE", versionEndExcluding: "1.7.10", vulnerable: true, }, { criteria: "cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*", matchCriteriaId: "FCDC1BBF-AFA1-43B2-8318-E97B74B7F6C5", versionEndExcluding: "1.8.3", versionStartIncluding: "1.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", matchCriteriaId: "8D305F7A-D159-4716-AB26-5E38BB5CD991", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", matchCriteriaId: "07C312A0-CD2C-4B9C-B064-6409B25C278F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*", matchCriteriaId: "A5319543-0143-4E2E-AA77-B7F116C1336C", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*", matchCriteriaId: "3EB3B106-0E2D-4363-B768-4AC84F568F2A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", }, { lang: "es", value: "Libgcrypt en versiones anteriores a la 1.7.10 y versiones 1.8.x anteriores a la 1.8.3 permite un ataque de canal lateral por caché de memoria en las firmas ECDSA que se puede mitigar mediante el uso de la ocultación durante el proceso de firmado en la función _gcry_ecc_ecdsa_sign en cipher/ecc-ecdsa.c. Esto también se conoce como Return Of the Hidden Number Problem o ROHNP. Para descubrir una clave ECDSA, el atacante necesita acceso a la máquina local o a una máquina virtual diferente en el mismo host físico.", }, ], id: "CVE-2018-0495", lastModified: "2024-11-21T03:38:21.160", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 1.9, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 1, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-06-13T23:29:00.333", references: [ { source: "security@debian.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041144", }, { source: "security@debian.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041147", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3221", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { source: "security@debian.org", url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { source: "security@debian.org", url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { source: "security@debian.org", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { source: "security@debian.org", url: "https://access.redhat.com/errata/RHSA-2019:2237", }, { source: "security@debian.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://dev.gnupg.org/T4011", }, { source: "security@debian.org", url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965", }, { source: "security@debian.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html", }, { source: "security@debian.org", tags: [ "Vendor Advisory", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3689-1/", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3689-2/", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3692-1/", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3692-2/", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3850-1/", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3850-2/", }, { source: "security@debian.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4231", }, { source: "security@debian.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, { source: "security@debian.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041144", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041147", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3221", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://access.redhat.com/errata/RHSA-2019:2237", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://dev.gnupg.org/T4011", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3689-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3689-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3692-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3692-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3850-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3850-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4231", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", }, ], sourceIdentifier: "security@debian.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-203", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2018-0495
Vulnerability from cvelistv5
Published
2018-06-13 23:00
Modified
2024-08-05 03:28
Severity ?
EPSS score ?
Summary
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 |
Version: Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:28:10.586Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965", }, { name: "1041144", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041144", }, { name: "USN-3850-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3850-1/", }, { name: "1041147", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041147", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, { name: "USN-3689-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3689-1/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html", }, { name: "USN-3689-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3689-2/", }, { name: "USN-3692-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3692-2/", }, { name: "[debian-lts-announce] 20180629 [SECURITY] [DLA 1405-1] libgcrypt20 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html", }, { name: "DSA-4231", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2018/dsa-4231", }, { name: "RHSA-2018:3505", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { name: "USN-3850-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3850-2/", }, { name: "USN-3692-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3692-1/", }, { name: "RHSA-2018:3221", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3221", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://dev.gnupg.org/T4011", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", }, { name: "RHSA-2019:1297", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { name: "RHSA-2019:1296", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { name: "RHSA-2019:1543", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { name: "RHSA-2019:2237", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:2237", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3", vendor: "n/a", versions: [ { status: "affected", version: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3", }, ], }, ], datePublic: "2018-06-13T00:00:00", descriptions: [ { lang: "en", value: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", }, ], problemTypes: [ { descriptions: [ { description: "side-channel attack", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-08-06T16:06:34", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965", }, { name: "1041144", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041144", }, { name: "USN-3850-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3850-1/", }, { name: "1041147", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041147", }, { tags: [ "x_refsource_MISC", ], url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, { name: "USN-3689-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3689-1/", }, { tags: [ "x_refsource_MISC", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html", }, { name: "USN-3689-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3689-2/", }, { name: "USN-3692-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3692-2/", }, { name: "[debian-lts-announce] 20180629 [SECURITY] [DLA 1405-1] libgcrypt20 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html", }, { name: "DSA-4231", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2018/dsa-4231", }, { name: "RHSA-2018:3505", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { name: "USN-3850-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3850-2/", }, { name: "USN-3692-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3692-1/", }, { name: "RHSA-2018:3221", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3221", }, { tags: [ "x_refsource_MISC", ], url: "https://dev.gnupg.org/T4011", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", }, { name: "RHSA-2019:1297", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { name: "RHSA-2019:1296", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { name: "RHSA-2019:1543", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { name: "RHSA-2019:2237", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:2237", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2018-0495", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3", version: { version_data: [ { version_value: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "side-channel attack", }, ], }, ], }, references: { reference_data: [ { name: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965", refsource: "MISC", url: "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965", }, { name: "1041144", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041144", }, { name: "USN-3850-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3850-1/", }, { name: "1041147", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041147", }, { name: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", refsource: "MISC", url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, { name: "USN-3689-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3689-1/", }, { name: "https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html", refsource: "MISC", url: "https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html", }, { name: "USN-3689-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3689-2/", }, { name: "USN-3692-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3692-2/", }, { name: "[debian-lts-announce] 20180629 [SECURITY] [DLA 1405-1] libgcrypt20 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html", }, { name: "DSA-4231", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4231", }, { name: "RHSA-2018:3505", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { name: "USN-3850-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3850-2/", }, { name: "USN-3692-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3692-1/", }, { name: "RHSA-2018:3221", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3221", }, { name: "https://dev.gnupg.org/T4011", refsource: "MISC", url: "https://dev.gnupg.org/T4011", }, { name: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", refsource: "MISC", url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", }, { name: "RHSA-2019:1297", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { name: "RHSA-2019:1296", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { name: "RHSA-2019:1543", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { name: "RHSA-2019:2237", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2237", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2018-0495", datePublished: "2018-06-13T23:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-08-05T03:28:10.586Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2013-1620
Vulnerability from cvelistv5
Published
2013-02-08 19:00
Modified
2024-08-06 15:04
Severity ?
EPSS score ?
Summary
The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T15:04:49.481Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "57777", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/57777", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.isg.rhul.ac.uk/tls/TLStiming.pdf", }, { name: "openSUSE-SU-2013:0630", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html", }, { name: "[oss-security] 20130205 Re: CVE request: TLS CBC padding timing flaw in various SSL / TLS implementations", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://openwall.com/lists/oss-security/2013/02/05/24", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "USN-1763-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-1763-1", }, { name: "GLSA-201406-19", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201406-19.xml", }, { name: "RHSA-2013:1135", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2013-1135.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { name: "RHSA-2013:1144", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2013-1144.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "openSUSE-SU-2013:0631", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html", }, { name: "64758", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/64758", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2013-02-05T00:00:00", descriptions: [ { lang: "en", value: "The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-09T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "57777", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/57777", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { tags: [ "x_refsource_MISC", ], url: "http://www.isg.rhul.ac.uk/tls/TLStiming.pdf", }, { name: "openSUSE-SU-2013:0630", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html", }, { name: "[oss-security] 20130205 Re: CVE request: TLS CBC padding timing flaw in various SSL / TLS implementations", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://openwall.com/lists/oss-security/2013/02/05/24", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "USN-1763-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-1763-1", }, { name: "GLSA-201406-19", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201406-19.xml", }, { name: "RHSA-2013:1135", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2013-1135.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { name: "RHSA-2013:1144", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2013-1144.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "openSUSE-SU-2013:0631", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html", }, { name: "64758", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/64758", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2013-1620", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "57777", refsource: "BID", url: "http://www.securityfocus.com/bid/57777", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "http://www.isg.rhul.ac.uk/tls/TLStiming.pdf", refsource: "MISC", url: "http://www.isg.rhul.ac.uk/tls/TLStiming.pdf", }, { name: "openSUSE-SU-2013:0630", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html", }, { name: "[oss-security] 20130205 Re: CVE request: TLS CBC padding timing flaw in various SSL / TLS implementations", refsource: "MLIST", url: "http://openwall.com/lists/oss-security/2013/02/05/24", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "USN-1763-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-1763-1", }, { name: "GLSA-201406-19", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201406-19.xml", }, { name: "RHSA-2013:1135", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2013-1135.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { name: "RHSA-2013:1144", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2013-1144.html", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "openSUSE-SU-2013:0631", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html", }, { name: "64758", refsource: "BID", url: "http://www.securityfocus.com/bid/64758", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2013-1620", datePublished: "2013-02-08T19:00:00", dateReserved: "2013-02-05T00:00:00", dateUpdated: "2024-08-06T15:04:49.481Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-7182
Vulnerability from cvelistv5
Published
2015-11-05 02:00
Modified
2024-08-06 07:43
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T07:43:44.875Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "1034069", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034069", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bto.bluecoat.com/security-advisory/sa119", }, { name: "DSA-3688", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3688", }, { name: "DSA-3410", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3410", }, { name: "SUSE-SU-2015:2081", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", }, { name: "GLSA-201512-10", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201512-10", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "SUSE-SU-2015:1981", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1202868", }, { name: "openSUSE-SU-2015:2229", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes", }, { name: "USN-2785-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2785-1", }, { name: "USN-2791-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2791-1", }, { name: "SUSE-SU-2015:1926", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "RHSA-2015:1981", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1981.html", }, { name: "USN-2819-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2819-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { name: "91787", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes", }, { name: "openSUSE-SU-2015:1942", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", }, { name: "RHSA-2015:1980", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1980.html", }, { name: "DSA-3393", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3393", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html", }, { name: "77416", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/77416", }, { name: "openSUSE-SU-2015:2245", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", }, { name: "GLSA-201605-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201605-06", }, { name: "SSA:2015-310-02", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html", }, { name: "SUSE-SU-2015:1978", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-03T00:00:00", descriptions: [ { lang: "en", value: "Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-03T18:57:01", orgId: "f16b083a-5664-49f3-a51e-8d479e5ed7fe", shortName: "mozilla", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "1034069", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034069", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bto.bluecoat.com/security-advisory/sa119", }, { name: "DSA-3688", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3688", }, { name: "DSA-3410", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3410", }, { name: "SUSE-SU-2015:2081", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", }, { name: "GLSA-201512-10", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201512-10", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "SUSE-SU-2015:1981", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1202868", }, { name: "openSUSE-SU-2015:2229", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes", }, { name: "USN-2785-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2785-1", }, { name: "USN-2791-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2791-1", }, { name: "SUSE-SU-2015:1926", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "RHSA-2015:1981", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1981.html", }, { name: "USN-2819-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2819-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { name: "91787", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/91787", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes", }, { name: "openSUSE-SU-2015:1942", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", }, { name: "RHSA-2015:1980", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1980.html", }, { name: "DSA-3393", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2015/dsa-3393", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html", }, { name: "77416", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/77416", }, { name: "openSUSE-SU-2015:2245", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", }, { name: "GLSA-201605-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201605-06", }, { name: "SSA:2015-310-02", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html", }, { name: "SUSE-SU-2015:1978", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@mozilla.org", ID: "CVE-2015-7182", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "1034069", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034069", }, { name: "https://bto.bluecoat.com/security-advisory/sa119", refsource: "CONFIRM", url: "https://bto.bluecoat.com/security-advisory/sa119", }, { name: "DSA-3688", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3688", }, { name: "DSA-3410", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3410", }, { name: "SUSE-SU-2015:2081", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", }, { name: "GLSA-201512-10", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201512-10", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "SUSE-SU-2015:1981", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", }, { name: "https://bugzilla.mozilla.org/show_bug.cgi?id=1202868", refsource: "CONFIRM", url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1202868", }, { name: "openSUSE-SU-2015:2229", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", }, { name: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes", refsource: "CONFIRM", url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes", }, { name: "USN-2785-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2785-1", }, { name: "USN-2791-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2791-1", }, { name: "SUSE-SU-2015:1926", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", }, { name: "RHSA-2015:1981", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-1981.html", }, { name: "USN-2819-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2819-1", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { name: "91787", refsource: "BID", url: "http://www.securityfocus.com/bid/91787", }, { name: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes", refsource: "CONFIRM", url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes", }, { name: "openSUSE-SU-2015:1942", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", }, { name: "RHSA-2015:1980", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2015-1980.html", }, { name: "DSA-3393", refsource: "DEBIAN", url: "http://www.debian.org/security/2015/dsa-3393", }, { name: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes", refsource: "CONFIRM", url: "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes", }, { name: "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html", }, { name: "77416", refsource: "BID", url: "http://www.securityfocus.com/bid/77416", }, { name: "openSUSE-SU-2015:2245", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", }, { name: "GLSA-201605-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201605-06", }, { name: "SSA:2015-310-02", refsource: "SLACKWARE", url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753", }, { name: "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html", refsource: "CONFIRM", url: "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html", }, { name: "SUSE-SU-2015:1978", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f16b083a-5664-49f3-a51e-8d479e5ed7fe", assignerShortName: "mozilla", cveId: "CVE-2015-7182", datePublished: "2015-11-05T02:00:00", dateReserved: "2015-09-16T00:00:00", dateUpdated: "2024-08-06T07:43:44.875Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }