crypto/bn/bn_nist.c in OpenSSL prior to 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote malicious users to obtain the private key of a TLS server via multiple handshake attempts.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openssl openssl 0.9.8 |
||
openssl openssl 0.9.8a |
||
openssl openssl 0.9.2b |
||
openssl openssl 0.9.3 |
||
openssl openssl 0.9.5a |
||
openssl openssl 0.9.6 |
||
openssl openssl 0.9.6g |
||
openssl openssl 0.9.6d |
||
openssl openssl 0.9.6k |
||
openssl openssl 0.9.7 |
||
openssl openssl 0.9.7m |
||
openssl openssl 0.9.7c |
||
openssl openssl 0.9.7h |
||
openssl openssl 0.9.8b |
||
openssl openssl 0.9.8c |
||
openssl openssl 0.9.3a |
||
openssl openssl 0.9.4 |
||
openssl openssl 0.9.6a |
||
openssl openssl 0.9.6f |
||
openssl openssl 0.9.8f |
||
openssl openssl 0.9.1c |
||
openssl openssl 0.9.5 |
||
openssl openssl 0.9.6b |
||
openssl openssl 0.9.6e |
||
openssl openssl 0.9.7e |
||
openssl openssl 0.9.7b |
||
openssl openssl 0.9.7k |
||
openssl openssl 0.9.7l |
||
openssl openssl 0.9.6i |
||
openssl openssl 0.9.6j |
||
openssl openssl 0.9.6m |
||
openssl openssl 0.9.7a |
||
openssl openssl 0.9.7i |
||
openssl openssl 0.9.7f |
||
openssl openssl |
||
openssl openssl 0.9.8d |
||
openssl openssl 0.9.8e |
||
openssl openssl 0.9.6h |
||
openssl openssl 0.9.6c |
||
openssl openssl 0.9.6l |
||
openssl openssl 0.9.7d |
||
openssl openssl 0.9.7g |
||
openssl openssl 0.9.7j |