Vulnerabilities > CVE-2013-5915 - Cryptographic Issues vulnerability in Polarssl
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The RSA-CRT implementation in PolarSSL before 1.2.9 does not properly perform Montgomery multiplication, which might allow remote attackers to conduct a timing side-channel attack and retrieve RSA private keys.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2013-18251.NASL description Bugfix release fixing CVE-2013-5915, https://polarssl.org/tech-updates/releases/polarssl-1.2.9-released Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-03-17 modified 2013-10-15 plugin id 70420 published 2013-10-15 reporter This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/70420 title Fedora 18 : polarssl-1.2.9-1.fc18 (2013-18251) NASL family Fedora Local Security Checks NASL id FEDORA_2013-18228.NASL description Bugfix release fixing CVE-2013-5915, https://polarssl.org/tech-updates/releases/polarssl-1.2.9-released Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-03-17 modified 2013-10-15 plugin id 70419 published 2013-10-15 reporter This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/70419 title Fedora 19 : polarssl-1.2.9-1.fc19 (2013-18228) NASL family Fedora Local Security Checks NASL id FEDORA_2014-7261.NASL description - Update to 1.2.10 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-03-17 modified 2014-06-20 plugin id 76152 published 2014-06-20 reporter This script is Copyright (C) 2014-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/76152 title Fedora 19 : polarssl-1.2.10-2.fc19 (2014-7261) NASL family Fedora Local Security Checks NASL id FEDORA_2014-7263.NASL description - Update to 1.2.10 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-03-17 modified 2014-06-20 plugin id 76153 published 2014-06-20 reporter This script is Copyright (C) 2014-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/76153 title Fedora 20 : polarssl-1.2.10-2.fc20 (2014-7263) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201310-10.NASL description The remote host is affected by the vulnerability described in GLSA-201310-10 (PolarSSL: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in PolarSSL. Please review the CVE identifiers referenced below for details. Impact : A remote attacker might be able to cause Denial of Service, conduct a man-in-the middle attack, compromise an encrypted communication channel, or obtain sensitive information. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 70486 published 2013-10-18 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/70486 title GLSA-201310-10 : PolarSSL: Multiple vulnerabilities NASL family Fedora Local Security Checks NASL id FEDORA_2013-18216.NASL description Bugfix release fixing CVE-2013-5915, https://polarssl.org/tech-updates/releases/polarssl-1.2.9-released Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-03-17 modified 2013-10-11 plugin id 70377 published 2013-10-11 reporter This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/70377 title Fedora 20 : polarssl-1.2.9-1.fc20 (2013-18216) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_CCEFAC3E2AED11E3AF10000C29789CB5.NASL description PolarSSL Project reports : The researchers Cyril Arnaud and Pierre-Alain Fouque investigated the PolarSSL RSA implementation and discovered a bias in the implementation of the Montgomery multiplication that we used. For which they then show that it can be used to mount an attack on the RSA key. Although their test attack is done on a local system, there seems to be enough indication that this can properly be performed from a remote system as well. All versions prior to PolarSSL 1.2.9 and 1.3.0 are affected if a third party can send arbitrary handshake messages to your server. If correctly executed, this attack reveals the entire private RSA key after a large number of attack messages (> 600.000 on a local machine) are sent to show the timing differences. last seen 2020-06-01 modified 2020-06-02 plugin id 70264 published 2013-10-02 reporter This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/70264 title FreeBSD : polarssl -- Timing attack against protected RSA-CRT implementation (ccefac3e-2aed-11e3-af10-000c29789cb5) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-2782.NASL description Multiple security issues have been discovered in PolarSSL, a lightweight crypto and SSL/TLS library : - CVE-2013-4623 Jack Lloyd discovered a denial of service vulnerability in the parsing of PEM-encoded certificates. - CVE-2013-5914 Paul Brodeur and TrustInSoft discovered a buffer overflow in the ssl_read_record() function, allowing the potential execution of arbitrary code. - CVE-2013-5915 Cyril Arnaud and Pierre-Alain Fouque discovered timing attacks against the RSA implementation. last seen 2020-03-17 modified 2013-10-22 plugin id 70533 published 2013-10-22 reporter This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/70533 title Debian DSA-2782-1 : polarssl - several vulnerabilities
References
- http://lists.fedoraproject.org/pipermail/package-announce/2013-October/118758.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-October/118758.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119014.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119014.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119018.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119018.html
- http://osvdb.org/98049
- http://osvdb.org/98049
- http://secunia.com/advisories/55084
- http://secunia.com/advisories/55084
- http://www.debian.org/security/2013/dsa-2782
- http://www.debian.org/security/2013/dsa-2782
- http://www.securityfocus.com/bid/62771
- http://www.securityfocus.com/bid/62771
- https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-05
- https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-05