4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
openssl is vulnerable to timing attack. An attacker with access to mount a local timing attack during the ECDSA signature generation is able to exploit the vulnerability in the ECC scalar mmultiplication to recover the private key.
www.securityfocus.com/bid/105897
access.redhat.com/errata/RHSA-2019:0483
access.redhat.com/errata/RHSA-2019:0651
access.redhat.com/errata/RHSA-2019:0652
access.redhat.com/errata/RHSA-2019:2125
access.redhat.com/errata/RHSA-2019:3929
access.redhat.com/errata/RHSA-2019:3931
access.redhat.com/errata/RHSA-2019:3932
access.redhat.com/errata/RHSA-2019:3933
access.redhat.com/errata/RHSA-2019:3935
eprint.iacr.org/2018/1060.pdf
github.com/bbbrumley/portsmash
github.com/openssl/openssl/commit/93acd593979d1098a5c0cd492c789cc25bb948a4
github.com/openssl/openssl/pull/7593
lists.debian.org/debian-lts-announce/2018/11/msg00024.html
nodejs.org/en/blog/vulnerability/november-2018-security-releases/
security.gentoo.org/glsa/201903-10
security.netapp.com/advisory/ntap-20181126-0001/
support.f5.com/csp/article/K49711130?utm_source=f5support&utm_medium=RSS
usn.ubuntu.com/3840-1/
www.debian.org/security/2018/dsa-4348
www.debian.org/security/2018/dsa-4355
www.exploit-db.com/exploits/45785/
www.oracle.com/security-alerts/cpuapr2020.html
www.oracle.com/security-alerts/cpujan2020.html
www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
www.tenable.com/security/tns-2018-16
www.tenable.com/security/tns-2018-17
4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N