6.5

CVE-2017-3736

There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.

Data is provided by the National Vulnerability Database (NVD)
OpenSSLOpenSSL Version >= 1.0.2 < 1.0.2m
OpenSSLOpenSSL Version >= 1.1.0 < 1.1.0g
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 8.14% 0.918
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:P/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

https://www.tenable.com/security/tns-2017-14
Third Party Advisory
Issue Tracking
https://www.debian.org/security/2017/dsa-4017
Third Party Advisory
Issue Tracking
https://www.debian.org/security/2017/dsa-4018
Third Party Advisory
Issue Tracking
https://www.openssl.org/news/secadv/20171102.txt
Vendor Advisory
Issue Tracking
http://www.securityfocus.com/bid/101666
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1039727
Third Party Advisory
VDB Entry