SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   OpenBSD Kernel Vendors:   OpenBSD
OpenBSD DSA Signing Constant Timing Bug May Let Remote Users Obtain Potentially Sensitive Information on the Target System
SecurityTracker Alert ID:  1036041
SecurityTracker URL:  http://securitytracker.com/id/1036041
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jun 7 2016
Impact:   Disclosure of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.8, 5.9
Description:   A vulnerability was reported in OpenBSD. A remote user may be able to obtain potentially sensitive information on the target system.

The DSA signing algorithm may fail to run in constant time when the BN_FLG_CONSTTIME flag is set. A remote user may be able to exploit this to obtain potentially sensitive timing information regarding the cryptographic signature process.

Cesar Pereida (Aalto University), Billy Brumley (Tampere University of Technology), and Yuval Yarom (The University of Adelaide and NICTA) reported this vulnerability.

Impact:   A remote user can obtain potentially sensitive timing information regarding the cryptographic signature process.
Solution:   The vendor has issued a fix, available at:

http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/017_crypto.patch.sig
http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/011_crypto.patch.sig

The vendor's advisory is available at:

http://www.openbsd.org/errata58.html
http://www.openbsd.org/errata59.html

Vendor URL:  www.openbsd.org/errata59.html (Links to External Site)
Cause:   State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC