Vulnerability Details : CVE-2007-3108
The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.
Exploit prediction scoring system (EPSS) score for CVE-2007-3108
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 13 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-3108
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
1.2
|
LOW | AV:L/AC:H/Au:N/C:P/I:N/A:N |
1.9
|
2.9
|
NIST |
Vendor statements for CVE-2007-3108
-
Red Hat 2007-08-14This paper describes a possible side-channel attack that hasn’t been proven outside of a lab environment. In reality many factors would make this harder to exploit. If exploited, a local user could obtain RSA private keys (for example for web sites being run on the server). We have rated this as affecting Red Hat products with moderate security severity. Although the OpenSSL team have produced a patch for this issue, it is non-trivial and will require more testing before we can deploy it in a future update. Our current plan is as follows: - To include a backported fix in an OpenSSL update as part of Enterprise Linux 4.6. This will get testing via beta and give time for more extensive internal and upstream testing - To release an update for OpenSSL for other platforms at the same time as 4.6 is released http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3108
-
https://issues.rpath.com/browse/RPL-1613
-
http://cvs.openssl.org/chngview?cn=16275
- http://security.gentoo.org/glsa/glsa-200710-06.xml
- http://www.redhat.com/support/errata/RHSA-2007-0964.html
-
http://www.securityfocus.com/bid/25163
Patch
- http://www.securityfocus.com/archive/1/486859/100/0/threaded
- http://www.vmware.com/security/advisories/VMSA-2008-0013.html
- http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
- https://issues.rpath.com/browse/RPL-1633
-
http://www.vupen.com/english/advisories/2007/4010
- http://www.redhat.com/support/errata/RHSA-2007-0813.html
- http://www.vupen.com/english/advisories/2008/2361
-
http://www.kb.cert.org/vuls/id/RGII-74KLP3
- http://support.avaya.com/elmodocs2/security/ASA-2007-485.htm
-
http://www.vupen.com/english/advisories/2007/2759
-
http://www.debian.org/security/2008/dsa-1571
[SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator
- http://www.securityfocus.com/archive/1/485936/100/0/threaded
- http://www.vupen.com/english/advisories/2008/0064
- http://www.vupen.com/english/advisories/2008/2362
- http://lists.vmware.com/pipermail/security-announce/2008/000002.html
- http://support.attachmate.com/techdocs/2374.html
- http://www.redhat.com/support/errata/RHSA-2007-1003.html
-
http://openssl.org/news/patch-CVE-2007-3108.txt
-
http://www.securityfocus.com/archive/1/476341/100/0/threaded
- http://www.vupen.com/english/advisories/2008/2396
-
http://www.kb.cert.org/vuls/id/724968
US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9984
- http://www.vmware.com/security/advisories/VMSA-2008-0001.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:193
-
http://www.bluecoat.com/support/securityadvisories/advisory_openssl_rsa_key_reconstruction_vulnerability
- https://usn.ubuntu.com/522-1/
- cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*