Vulnerabilities > CVE-2013-5915 - Cryptographic Issues vulnerability in Polarssl

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
polarssl
CWE-310
nessus

Summary

The RSA-CRT implementation in PolarSSL before 1.2.9 does not properly perform Montgomery multiplication, which might allow remote attackers to conduct a timing side-channel attack and retrieve RSA private keys.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-18251.NASL
    descriptionBugfix release fixing CVE-2013-5915, https://polarssl.org/tech-updates/releases/polarssl-1.2.9-released Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-10-15
    plugin id70420
    published2013-10-15
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70420
    titleFedora 18 : polarssl-1.2.9-1.fc18 (2013-18251)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-18228.NASL
    descriptionBugfix release fixing CVE-2013-5915, https://polarssl.org/tech-updates/releases/polarssl-1.2.9-released Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-10-15
    plugin id70419
    published2013-10-15
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70419
    titleFedora 19 : polarssl-1.2.9-1.fc19 (2013-18228)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-7261.NASL
    description - Update to 1.2.10 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-06-20
    plugin id76152
    published2014-06-20
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/76152
    titleFedora 19 : polarssl-1.2.10-2.fc19 (2014-7261)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-7263.NASL
    description - Update to 1.2.10 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-06-20
    plugin id76153
    published2014-06-20
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/76153
    titleFedora 20 : polarssl-1.2.10-2.fc20 (2014-7263)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201310-10.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201310-10 (PolarSSL: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in PolarSSL. Please review the CVE identifiers referenced below for details. Impact : A remote attacker might be able to cause Denial of Service, conduct a man-in-the middle attack, compromise an encrypted communication channel, or obtain sensitive information. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id70486
    published2013-10-18
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70486
    titleGLSA-201310-10 : PolarSSL: Multiple vulnerabilities
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-18216.NASL
    descriptionBugfix release fixing CVE-2013-5915, https://polarssl.org/tech-updates/releases/polarssl-1.2.9-released Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-10-11
    plugin id70377
    published2013-10-11
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70377
    titleFedora 20 : polarssl-1.2.9-1.fc20 (2013-18216)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_CCEFAC3E2AED11E3AF10000C29789CB5.NASL
    descriptionPolarSSL Project reports : The researchers Cyril Arnaud and Pierre-Alain Fouque investigated the PolarSSL RSA implementation and discovered a bias in the implementation of the Montgomery multiplication that we used. For which they then show that it can be used to mount an attack on the RSA key. Although their test attack is done on a local system, there seems to be enough indication that this can properly be performed from a remote system as well. All versions prior to PolarSSL 1.2.9 and 1.3.0 are affected if a third party can send arbitrary handshake messages to your server. If correctly executed, this attack reveals the entire private RSA key after a large number of attack messages (> 600.000 on a local machine) are sent to show the timing differences.
    last seen2020-06-01
    modified2020-06-02
    plugin id70264
    published2013-10-02
    reporterThis script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70264
    titleFreeBSD : polarssl -- Timing attack against protected RSA-CRT implementation (ccefac3e-2aed-11e3-af10-000c29789cb5)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2782.NASL
    descriptionMultiple security issues have been discovered in PolarSSL, a lightweight crypto and SSL/TLS library : - CVE-2013-4623 Jack Lloyd discovered a denial of service vulnerability in the parsing of PEM-encoded certificates. - CVE-2013-5914 Paul Brodeur and TrustInSoft discovered a buffer overflow in the ssl_read_record() function, allowing the potential execution of arbitrary code. - CVE-2013-5915 Cyril Arnaud and Pierre-Alain Fouque discovered timing attacks against the RSA implementation.
    last seen2020-03-17
    modified2013-10-22
    plugin id70533
    published2013-10-22
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70533
    titleDebian DSA-2782-1 : polarssl - several vulnerabilities