CVE-2019-1551
rsaz_512_sqr overflow bug on x86_64
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).
Hay un error de desbordamiento en el procedimiento de cuadratura Montgomery x64_64 utilizado en exponenciación con módulos de 512 bits. No hay algoritmos EC afectados. El análisis sugiere que los ataques contra 2-prime RSA1024, 3-prime RSA1536 y DSA1024 como resultado de este defecto serían muy difíciles de realizar y no se cree probable. Los ataques contra DH512 se consideran simplemente factibles. Sin embargo, para un ataque, el objetivo tendría que reutilizar la clave privada DH512, que de todos modos no se recomienda. También las aplicaciones que usan directamente la API de bajo nivel BN_mod_exp pueden verse afectadas si usan BN_FLG_CONSTTIME. Corregido en OpenSSL 1.1.1e (afectado 1.1.1-1.1.1d). Corregido en OpenSSL 1.0.2u (afectado 1.0.2-1.0.2t).
An integer overflow was found in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. As per upstream:
* No EC algorithms are affected.
* Attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely.
* Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway.
* Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-11-28 CVE Reserved
- 2019-12-06 CVE Published
- 2023-11-08 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (26)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html | Third Party Advisory | |
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=419102400a2811582a7a3d4a4e317d72e5ce0a8f | X_refsource_confirm | |
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f1c5eea8a817075d31e43f5876993c6710238c98 | X_refsource_confirm | |
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html | Mailing List | |
https://seclists.org/bugtraq/2019/Dec/39 | Mailing List | |
https://seclists.org/bugtraq/2019/Dec/46 | Mailing List | |
https://security.netapp.com/advisory/ntap-20191210-0001 | Third Party Advisory | |
https://www.tenable.com/security/tns-2019-09 | Third Party Advisory | |
https://www.tenable.com/security/tns-2020-03 | Third Party Advisory | |
https://www.tenable.com/security/tns-2020-11 | Third Party Advisory | |
https://www.tenable.com/security/tns-2021-10 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.oracle.com/security-alerts/cpuApr2021.html | 2023-11-07 | |
https://www.oracle.com/security-alerts/cpujan2021.html | 2023-11-07 | |
https://www.oracle.com/security-alerts/cpujul2020.html | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openssl Search vendor "Openssl" | Openssl Search vendor "Openssl" for product "Openssl" | >= 1.0.2 <= 1.0.2t Search vendor "Openssl" for product "Openssl" and version " >= 1.0.2 <= 1.0.2t" | - |
Affected
| ||||||
Openssl Search vendor "Openssl" | Openssl Search vendor "Openssl" for product "Openssl" | >= 1.1.1 <= 1.1.1d Search vendor "Openssl" for product "Openssl" and version " >= 1.1.1 <= 1.1.1d" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.1 Search vendor "Opensuse" for product "Leap" and version "15.1" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Enterprise Manager Ops Center Search vendor "Oracle" for product "Enterprise Manager Ops Center" | 12.4.0.0 Search vendor "Oracle" for product "Enterprise Manager Ops Center" and version "12.4.0.0" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Mysql Enterprise Monitor Search vendor "Oracle" for product "Mysql Enterprise Monitor" | <= 4.0.12 Search vendor "Oracle" for product "Mysql Enterprise Monitor" and version " <= 4.0.12" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Mysql Enterprise Monitor Search vendor "Oracle" for product "Mysql Enterprise Monitor" | >= 8.0.0 <= 8.0.20 Search vendor "Oracle" for product "Mysql Enterprise Monitor" and version " >= 8.0.0 <= 8.0.20" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Peoplesoft Enterprise Peopletools Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" | 8.56 Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" and version "8.56" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Peoplesoft Enterprise Peopletools Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" | 8.57 Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" and version "8.57" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Peoplesoft Enterprise Peopletools Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" | 8.58 Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" and version "8.58" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 19.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "19.10" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 30 Search vendor "Fedoraproject" for product "Fedora" and version "30" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 31 Search vendor "Fedoraproject" for product "Fedora" and version "31" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 32 Search vendor "Fedoraproject" for product "Fedora" and version "32" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Tenable Search vendor "Tenable" | Log Correlation Engine Search vendor "Tenable" for product "Log Correlation Engine" | < 6.0.9 Search vendor "Tenable" for product "Log Correlation Engine" and version " < 6.0.9" | - |
Affected
|