|Date: (C)2014-06-16 (M)2017-12-18|| |
The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
|CVSS Score: 1.9||Access Vector: LOCAL|
|Exploit Score: 3.4||Access Complexity: MEDIUM|
|Impact Score: 2.9||Authentication: NONE|
| ||Confidentiality: PARTIAL|
| ||Integrity: NONE|
| ||Availability: NONE|