Vulnerability Details : CVE-2016-7056
A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
Exploit prediction scoring system (EPSS) score for CVE-2016-7056
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 8 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-7056
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
Red Hat, Inc. |
CWE ids for CVE-2016-7056
-
Assigned by: nvd@nist.gov (Secondary)
-
Covert timing channels convey information by modulating some aspect of system behavior over time, so that the program receiving the information can observe system behavior and infer protected information.Assigned by: secalert@redhat.com (Primary)
References for CVE-2016-7056
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7056
1412120 – (CVE-2016-7056) CVE-2016-7056 openssl: ECDSA P-256 timing attack key recoveryIssue Tracking;Patch;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:1414
RHSA-2017:1414 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:1801
RHSA-2017:1801 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securityfocus.com/bid/95375
OpenSSL CVE-2016-7056 Local Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1037575
OpenSSL ecdsa_sign_setup() Timing Flaw Lets Local Users Recover Private Keys - SecurityTrackerPatch;Third Party Advisory;VDB Entry
-
https://security-tracker.debian.org/tracker/CVE-2016-7056
CVE-2016-7056Patch;Third Party Advisory;VDB Entry
-
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=8aed2a7548362e88e84a7feb795a3a97e8395008
git.openssl.org Git
-
http://rhn.redhat.com/errata/RHSA-2017-1415.html
RHSA-2017:1415 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/016_libcrypto.patch.sig
Patch;Third Party Advisory
-
https://seclists.org/oss-sec/2017/q1/52
oss-sec: CVE-2016-7056 ECDSA P-256 timing attack key recovery (OpenSSL, LibreSSL, BoringSSL)Mailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:1802
RHSA-2017:1802 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7056.html
CVE-2016-7056 in UbuntuPatch;Third Party Advisory
-
https://www.debian.org/security/2017/dsa-3773
Debian -- Security Information -- DSA-3773-1 opensslThird Party Advisory
-
https://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/033_libcrypto.patch.sig
Patch;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:1413
RHSA-2017:1413 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://eprint.iacr.org/2016/1195
Cryptology ePrint Archive: Report 2016/1195 - Constant-Time Callees with Variable-Time CallersThird Party Advisory
Products affected by CVE-2016-7056
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*