CVE-2019-1551
Public on 2019-12-06
Modified on 2024-03-14
Description
An integer overflow was found in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. As per upstream:
* No EC algorithms are affected.
* Attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely.
* Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway.
* Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME
* No EC algorithms are affected.
* Attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely.
* Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway.
* Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 2 - Core | edk2 | Not Affected | ||
Amazon Linux 1 | openssl | No Fix Planned | ||
Amazon Linux 2 - Core | openssl | 2021-07-14 | ALAS2-2021-1687 | Fixed |
Amazon Linux 2023 | openssl | Not Affected | ||
Amazon Linux 1 | openssl098e | Not Affected | ||
Amazon Linux 2 - Core | openssl098e | No Fix Planned | ||
Amazon Linux 2 - Core | openssl11 | Not Affected |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 4.8 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
NVD | CVSSv2 | 5.0 | AV:N/AC:L/Au:N/C:P/I:N/A:N |
NVD | CVSSv3 | 5.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |