5
CVSSv2

CVE-2015-3193

Published: 06/12/2015 Updated: 30/11/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 prior to 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote malicious users to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 1.0.2a

openssl openssl 1.0.2d

openssl openssl 1.0.2c

openssl openssl 1.0.2b

openssl openssl 1.0.2

Vendor Advisories

Arch Linux Security Advisory ASA-201701-37 ========================================== Severity: Medium Date : 2017-01-28 CVE-ID : CVE-2016-7055 CVE-2017-3731 CVE-2017-3732 Package : openssl Type : multiple issues Remote : Yes Link : securityarchlinuxorg/AVG-154 Summary ======= The package openssl before version 102k-1 is ...
The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5pl in OpenSSL 102 before 102e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffi ...
Arch Linux Security Advisory ASA-201701-36 ========================================== Severity: Medium Date : 2017-01-27 CVE-ID : CVE-2016-7055 CVE-2017-3731 CVE-2017-3732 Package : lib32-openssl Type : multiple issues Remote : Yes Link : securityarchlinuxorg/AVG-155 Summary ======= The package lib32-openssl before version 1 ...
Several security issues were fixed in OpenSSL ...
About Apple security updatesFor our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available Recent releases are listed on the Apple security updates page For more information about security, see the Apple Product Security page You can encrypt ...
On December 3, 2015, the OpenSSL Project released a security advisory detailing five vulnerabilities Multiple Cisco products incorporate a version of the OpenSSL package affected by one or more vulnerabilities that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition  This advisory will be updated as add ...
<!-- Start - Changes for Security Advisory Channel --> Security Advisory ID SYMSA1338 Initial Publication Date: Advisory Status: Advisory Severity: CVSS Base Score: Legacy ID 10 Dec 2015 Open Medium CVSS v2: 50 SA1 ...
Oracle Critical Patch Update Advisory - October 2017 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the ...
Oracle Solaris Third Party Bulletin - January 2018 Description The Oracle Solaris Third Party Bulletin announces patches for one or more security vulnerabilities fixed in third party software that is included in Oracle Solaris distributions Starting January 20, 2015, Third Party Bulletins are released on the same day when Oracle Critica ...
Oracle Critical Patch Update Advisory - April 2016 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory ...
Oracle Critical Patch Update Advisory - July 2016 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous C ...

Mailing Lists

Orion Elite Hidden IP Browser Pro versions 10 through 79 have insecure versions of Tor and OpenSSL included and also suffer from man-in-the-middle vulnerabilities ...

Github Repositories

Code to fuzz bignum libraries

bignum-fuzz Code to fuzz bignum libraries CVE-2015-3193-openssl-vs-gcrypt-modexpc This is a simple test that will do a calculation that some versions of OpenSSL will get wrong and compare the result with libgcrypt openssl-vs-gcrypt-modexpc This is a sample code to fuzz the BN_mod_exp() function of OpenSSL and the gcry_mpi_powm() function of libgcrypt Usage instructions are

Resources About Fuzzing, For Multiple Platforms And All Popular Fuzzers. 500+ Open Source Tools Sorted By Star Count, 800+ Blog Posts Sorted By Publish Time.

所有收集类项目: 收集的所有开源工具: sec-tool-list: 超过21K, 包括Markdown和Json两种格式 安全资源收集类的 Repo: 1000+各类安全资源收集的Github Repo 全平台逆向资源: Windows平台安全: PE/DLL/DLL-Injection/Dll-Hijack/Dll-Load/UAC-Bypass/Sysmon/AppLocker/ETW/WSL/NET/Process-Injection/Code-Injection/DEP/Kernel/ Linux安全: ELF/

A collection of vulnerabilities discovered by the AFL fuzzer (afl-fuzz)

afl-cve A collection of vulnerabilities discovered by the AFL fuzzer (afl-fuzz) Introduction afl-cve is a collection of known vulnerabilities that can be attributed to the AFL fuzzer afl-fuzz All vulnerabilities in this list either already have a CVE assigned, or a CVE has been requested from a CVE Numbering Authority Why is This Necessary? Because CVE descriptions are not ge

References

CWE-200https://git.openssl.org/?p=openssl.git;a=commit;h=d73cc256c8e256c32ed959456101b73ba9842f72http://openssl.org/news/secadv/20151203.txthttps://blog.fuzzing-project.org/31-Fuzzing-Math-miscalculations-in-OpenSSLs-BN_mod_exp-CVE-2015-3193.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=1288317https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlhttp://www.securityfocus.com/bid/91787http://fortiguard.com/advisory/openssl-advisory-december-2015http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-opensslhttp://www.fortiguard.com/advisory/openssl-advisory-december-2015http://www.ubuntu.com/usn/USN-2830-1http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759https://kb.isc.org/article/AA-01438http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322http://www.securitytracker.com/id/1034294http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlhttp://www.securityfocus.com/bid/78705https://github.com/hannob/bignum-fuzzhttps://nvd.nist.govhttps://access.redhat.com/security/cve/cve-2015-3193http://tools.cisco.com/security/center/viewAlert.x?alertId=42528https://usn.ubuntu.com/2830-1/