5.3

CVE-2019-1551

There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).

Data is provided by the National Vulnerability Database (NVD)
OpenSSLOpenSSL Version >= 1.0.2 <= 1.0.2t
OpenSSLOpenSSL Version >= 1.1.1 <= 1.1.1d
OpensuseLeap Version15.1
OracleMysql Enterprise Monitor Version <= 4.0.12
OracleMysql Enterprise Monitor Version >= 8.0.0 <= 8.0.20
CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.10
FedoraprojectFedora Version30
FedoraprojectFedora Version31
FedoraprojectFedora Version32
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
TenableLog Correlation Engine Version < 6.0.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 4.53% 0.887
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE-190 Integer Overflow or Wraparound

The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.

https://usn.ubuntu.com/4376-1/
Third Party Advisory
https://usn.ubuntu.com/4504-1/
Third Party Advisory
https://seclists.org/bugtraq/2019/Dec/39
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Dec/46
Third Party Advisory
Mailing List