pazhanivel07 / openssl_1_0_2

Other
0 stars 0 forks source link

CVE-2015-3193 (High) detected in opensslOpenSSL_1_0_2, opensslOpenSSL_1_0_2 #7

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2015-3193 - High Severity Vulnerability

Vulnerable Libraries - opensslOpenSSL_1_0_2, opensslOpenSSL_1_0_2

Vulnerability Details

The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.

Publish Date: 2015-12-06

URL: CVE-2015-3193

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2015-3193

Release Date: 2015-12-06

Fix Resolution: 1.0.2e


Step up your Open Source Security Game with Mend here