Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
CVE ID: | CVE-2017-3738 |
Description: | There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.107270 1.3.6.1.4.1.25623.1.0.107269 1.3.6.1.4.1.25623.1.0.704157 1.3.6.1.4.1.25623.1.0.704065 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-3738 BugTraq ID: 102118 http://www.securityfocus.com/bid/102118 Debian Security Information: DSA-4065 (Google Search) https://www.debian.org/security/2017/dsa-4065 Debian Security Information: DSA-4157 (Google Search) https://www.debian.org/security/2018/dsa-4157 FreeBSD Security Advisory: FreeBSD-SA-17:12 https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc https://security.gentoo.org/glsa/201712-03 https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html RedHat Security Advisories: RHSA-2018:0998 https://access.redhat.com/errata/RHSA-2018:0998 RedHat Security Advisories: RHSA-2018:2185 https://access.redhat.com/errata/RHSA-2018:2185 RedHat Security Advisories: RHSA-2018:2186 https://access.redhat.com/errata/RHSA-2018:2186 RedHat Security Advisories: RHSA-2018:2187 https://access.redhat.com/errata/RHSA-2018:2187 http://www.securitytracker.com/id/1039978 |