[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2016-0702Date: (C)2016-03-10   (M)2024-02-22


The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.1CVSS Score : 1.9
Exploit Score: 1.4Exploit Score: 3.4
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
SECTRACK-1035133
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
DSA-3500
FEDORA-2016-2802690366
FEDORA-2016-e6807b3394
FreeBSD-SA-16:12
GLSA-201603-15
HPSBGN03563
RHSA-2016:2957
SUSE-SU-2016:0617
SUSE-SU-2016:0620
SUSE-SU-2016:0621
SUSE-SU-2016:0624
SUSE-SU-2016:0631
SUSE-SU-2016:0641
SUSE-SU-2016:1057
SUSE-SU-2016:1267
SUSE-SU-2016:1290
SUSE-SU-2016:1360
USN-2914-1
http://cachebleed.info
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://openssl.org/news/secadv/20160301.txt
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=708dc2f1291e104fe4eef810bb8ffc1fae5b19c1
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
https://www.openssl.org/news/secadv/20160301.txt
openSUSE-SU-2016:0627
openSUSE-SU-2016:0628
openSUSE-SU-2016:0637
openSUSE-SU-2016:0638
openSUSE-SU-2016:0720
openSUSE-SU-2016:1239
openSUSE-SU-2016:1241
openSUSE-SU-2016:1242
openSUSE-SU-2016:1273
openSUSE-SU-2016:1566

CPE    35
cpe:/a:openssl:openssl:1.0.1:beta1
cpe:/a:openssl:openssl:1.0.1:beta3
cpe:/o:debian:debian_linux:7.0
cpe:/a:openssl:openssl:1.0.1:beta2
...
CWE    1
CWE-200
OVAL    21
oval:org.secpod.oval:def:37847
oval:org.secpod.oval:def:33160
oval:org.secpod.oval:def:1600367
oval:org.secpod.oval:def:400662
...

© SecPod Technologies