National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2007-3108 Detail

Description

The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.

Source:  MITRE      Last Modified:  08/07/2007

Quick Info

CVE Dictionary Entry:
CVE-2007-3108
Original release date:
08/07/2007
Last revised:
10/10/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
1.2 LOW
Vector:
(AV:L/AC:H/Au:N/C:P/I:N/A:N) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
1.9
CVSS Version 2 Metrics:
Access Vector:
Locally exploitable
Access Complexity:
High
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information

Vendor Statements (disclaimer)

Official Statement from Red Hat (08/14/2007)

This paper describes a possible side-channel attack that hasn’t been proven outside of a lab environment. In reality many factors would make this harder to exploit. If exploited, a local user could obtain RSA private keys (for example for web sites being run on the server). We have rated this as affecting Red Hat products with moderate security severity. Although the OpenSSL team have produced a patch for this issue, it is non-trivial and will require more testing before we can deploy it in a future update. Our current plan is as follows: - To include a backported fix in an OpenSSL update as part of Enterprise Linux 4.6. This will get testing via beta and give time for more extensive internal and upstream testing - To release an update for OpenSSL for other platforms at the same time as 4.6 is released http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3108

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://cvs.openssl.org/chngview?cn=16275 External Source CONFIRM http://cvs.openssl.org/chngview?cn=16275
http://lists.vmware.com/pipermail/security-announce/2008/000002.html External Source MLIST [Security-announce] 20080107 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages
http://openssl.org/news/patch-CVE-2007-3108.txt External Source CONFIRM http://openssl.org/news/patch-CVE-2007-3108.txt
http://security.gentoo.org/glsa/glsa-200710-06.xml External Source GENTOO GLSA-200710-06
http://support.attachmate.com/techdocs/2374.html External Source CONFIRM http://support.attachmate.com/techdocs/2374.html
http://support.avaya.com/elmodocs2/security/ASA-2007-485.htm External Source CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2007-485.htm
http://www.bluecoat.com/support/securityadvisories/advisory_openssl_rsa_key_reconstruction_vulnerability External Source CONFIRM http://www.bluecoat.com/support/securityadvisories/advisory_openssl_rsa_key_reconstruction_vulnerability
http://www.debian.org/security/2008/dsa-1571 External Source DEBIAN DSA-1571
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml External Source GENTOO GLSA-200805-07
http://www.kb.cert.org/vuls/id/724968 US Government Resource External Source CERT-VN VU#724968
http://www.kb.cert.org/vuls/id/RGII-74KLP3 External Source CONFIRM http://www.kb.cert.org/vuls/id/RGII-74KLP3
http://www.mandriva.com/security/advisories?name=MDKSA-2007:193 External Source MANDRIVA MDKSA-2007:193
http://www.redhat.com/support/errata/RHSA-2007-0813.html External Source REDHAT RHSA-2007:0813
http://www.redhat.com/support/errata/RHSA-2007-0964.html External Source REDHAT RHSA-2007:0964
http://www.redhat.com/support/errata/RHSA-2007-1003.html External Source REDHAT RHSA-2007:1003
http://www.securityfocus.com/archive/1/archive/1/476341/100/0/threaded External Source BUGTRAQ 20070813 FLEA-2007-0043-1 openssl
http://www.securityfocus.com/archive/1/archive/1/485936/100/0/threaded External Source BUGTRAQ 20080108 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages
http://www.securityfocus.com/archive/1/archive/1/486859/100/0/threaded External Source BUGTRAQ 20080123 UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages
http://www.securityfocus.com/bid/25163 Patch External Source BID 25163
http://www.ubuntulinux.org/support/documentation/usn/usn-522-1 External Source UBUNTU USN-522-1
http://www.vmware.com/security/advisories/VMSA-2008-0001.html External Source CONFIRM http://www.vmware.com/security/advisories/VMSA-2008-0001.html
http://www.vmware.com/security/advisories/VMSA-2008-0013.html External Source CONFIRM http://www.vmware.com/security/advisories/VMSA-2008-0013.html
http://www.vupen.com/english/advisories/2007/2759 External Source VUPEN ADV-2007-2759
http://www.vupen.com/english/advisories/2007/4010 External Source VUPEN ADV-2007-4010
http://www.vupen.com/english/advisories/2008/0064 External Source VUPEN ADV-2008-0064
http://www.vupen.com/english/advisories/2008/2361 External Source VUPEN ADV-2008-2361
http://www.vupen.com/english/advisories/2008/2362 External Source VUPEN ADV-2008-2362
http://www.vupen.com/english/advisories/2008/2396 External Source VUPEN ADV-2008-2396
https://issues.rpath.com/browse/RPL-1613 External Source CONFIRM https://issues.rpath.com/browse/RPL-1613
https://issues.rpath.com/browse/RPL-1633 External Source CONFIRM https://issues.rpath.com/browse/RPL-1633
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9984 External Source OVAL oval:org.mitre.oval:def:9984

References to Check Content

Identifier:
oval:org.mitre.oval:def:9984
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:9984

Technical Details

Vulnerability Type (View All)

Change History 2 change records found - show changes