CVE-2016-0701 — Sensitive Information Exposure in Openssl
Severity
5.9MEDIUMNVD
NVD3.7OSV7.5OSV3.7
EPSS
27.5%
top 3.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 15
Latest updateDec 19
Description
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 2.2 | Impact: 1.4
Affected Packages12 packages
▶CVEListV5openssl/opensslFixed in OpenSSL 1.0.2zc-dev (Affected 1.0.2-1.0.2zb), Fixed in OpenSSL 1.1.1m (Affected 1.1.1-1.1.1l), Fixed in OpenSSL 3.0.1 (Affected 3.0.0)+2
Also affects: Debian Linux 10.0, 11.0, 8.0, 9.0
🔴Vulnerability Details
6GHSA▶
GHSA-gj3m-w8pf-46c5: There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli↗2022-05-14
GHSA▶
GHSA-ph2x-8239-7xc7: There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure↗2022-02-08
OSV▶
CVE-2021-4160: There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure↗2022-01-28
OSV▶
CVE-2017-3738: There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli↗2017-12-07
📋Vendor Advisories
11Debian▶
CVE-2021-4160: openssl - There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Ma...↗2021