Satheesh575555 / Openssl_1_1_0_CVE-2021-23841

Other
0 stars 0 forks source link

CVE-2018-0734 (Medium) detected in opensslOpenSSL_1_1_0g #12

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2018-0734 - Medium Severity Vulnerability

Vulnerable Library - opensslOpenSSL_1_1_0g

Akamai fork of openssl master.

Library home page: https://github.com/akamai/openssl.git

Found in HEAD commit: 4c0cda99bc44e45f32ea15e98aeb0a895ad1dd56

Found in base branch: master

Vulnerable Source Files (2)

/crypto/dsa/dsa_ossl.c /crypto/dsa/dsa_ossl.c

Vulnerability Details

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

Publish Date: 2018-10-30

URL: CVE-2018-0734

CVSS 3 Score Details (5.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734

Release Date: 2018-10-30

Fix Resolution: 1.0.2q,1.1.0j,1.1.1a


Step up your Open Source Security Game with Mend here