CVE-2016-2178
CWE-203CWE-119 — Buffer OverflowCWE-310CWE-635CWE-200 — Information ExposureCWE-38513 documents10 sources
Severity
5.5MEDIUM
EPSS
0.2%
top 54.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 20
Latest updateMay 13
Description
The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6
Affected Packages5 packages
Also affects: Debian Linux 8.0, Linux Enterprise 12.0, Ubuntu Linux 12.04, 14.04, 16.04
Patches
🔴Vulnerability Details
3📋Vendor Advisories
5💬Community
4Bugzilla▶
CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation [fedora-all]↗2016-06-07
Bugzilla▶
CVE-2016-2178 openssl101e: openssl: Non-constant time codepath followed for certain operations in DSA implementation [epel-5]↗2016-06-07
Bugzilla▶
CVE-2016-2178 mingw-openssl: openssl: Non-constant time codepath followed for certain operations in DSA implementation [fedora-all]↗2016-06-07
Bugzilla▶
CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation↗2016-06-07