Informazioni sul CVE-2014-0076
N/A
CWE ID: N/A
Base Score (CVSS): N/A
CVE: CVE-2014-0076
Descrizione: The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
Vettore di attacco
Punteggio CVSS
Il CVSS è un sistema di valutazione che misura la gravità di una vulnerabilità informatica considerando fattori come l’impatto potenziale, la probabilità di attacco e la facilità di esecuzione.
Punteggio Base (calcolato da AziendaSicura): 0.0 (None)
Riassunto: .
Dettaglio del Vettore
Metrica | Valore | Significato | Descrizione |
---|
Riferimenti esterni
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://secunia.com/advisories/59264
- http://secunia.com/advisories/59454
- http://www.securityfocus.com/bid/66363
- http://secunia.com/advisories/58492
- http://www.novell.com/support/kb/doc.php?id=7015264
- https://bugs.gentoo.org/show_bug.cgi?id=505278
- http://secunia.com/advisories/59445
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www-01.ibm.com/support/docview.wss?uid=swg21676092
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2198be3483259de374f91e57d247d0fc667aef29
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- http://marc.info/?l=bugtraq&m=140317760000786&w=2
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://marc.info/?l=bugtraq&m=140621259019789&w=2
- http://secunia.com/advisories/59300
- http://advisories.mageia.org/MGASA-2014-0165.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00007.html
- http://secunia.com/advisories/59495
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://secunia.com/advisories/59655
- http://secunia.com/advisories/59374
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://marc.info/?l=bugtraq&m=140389274407904&w=2
- http://secunia.com/advisories/58939
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://secunia.com/advisories/59514
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://secunia.com/advisories/59438
- http://marc.info/?l=bugtraq&m=140482916501310&w=2
- http://secunia.com/advisories/58727
- http://www.openssl.org/news/secadv_20140605.txt
- http://support.apple.com/kb/HT6443
- http://www.ubuntu.com/usn/USN-2165-1
- http://marc.info/?l=bugtraq&m=140904544427729&w=2
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:067
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- https://bugzilla.novell.com/show_bug.cgi?id=869945
- http://secunia.com/advisories/59040
- http://marc.info/?l=bugtraq&m=140389355508263&w=2
- http://secunia.com/advisories/59175
- http://marc.info/?l=bugtraq&m=140448122410568&w=2
- http://secunia.com/advisories/59413
- http://secunia.com/advisories/59721
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://secunia.com/advisories/59450
- http://secunia.com/advisories/59364
- http://www-01.ibm.com/support/docview.wss?uid=swg21676424
- http://secunia.com/advisories/60571
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://secunia.com/advisories/59162
- http://secunia.com/advisories/59490
- http://eprint.iacr.org/2014/140
Prodotti interessati
- n/a – n/a
Relazioni con altri prodotti
Nessun prodotto trovato per il CVE: cve-2014-0076