ID

VAR-E-200303-0184


CVE

cve_id:CVE-2003-0147

Trust: 0.3

sources: BID: 7101

TITLE

OpenSSL Timing Attack RSA Private Key Information Disclosure Vulnerability

Trust: 0.3

sources: BID: 7101

DESCRIPTION

A side-channel attack in the OpenSSL implementation has been published in a recent paper that may ultimately result in an active adversary gaining the RSA private key of a target server. The attack involves analysis of the timing of certain operations during client-server session key negotiation. Through this attack, it may be possible for a malicious client to discover the RSA private key of a server using the vulnerable software.

Trust: 0.3

sources: BID: 7101

AFFECTED PRODUCTS

vendor:vandykemodel:securecrtscope:eqversion:4.0.4

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:4.0.3

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:4.0.2

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:4.0.1

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.8

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.7

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.6

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.5

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.4

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.3

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.2

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.1

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.3.4

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.3.3

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.3.2

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.3.1

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.3

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.2.2

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.2.1

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.2

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.1.2

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.1.1

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.1

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.0

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:2.4

Trust: 0.3

vendor:sunmodel:cobalt raq xtrscope: - version: -

Trust: 0.3

vendor:sunmodel:cobalt raqscope:eqversion:550

Trust: 0.3

vendor:sunmodel:cobalt raqscope:eqversion:4

Trust: 0.3

vendor:sunmodel:cobalt qubescope:eqversion:3

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:4.04

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:4.03

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:4.02

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:4.01

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:4.00

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.22

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.21

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.19

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.18

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.17

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.16

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.15

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.14

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.13

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.12

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.11

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.9

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.8

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.7

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.20

Trust: 0.3

vendor:stunnelmodel:stunnelscope:eqversion:3.10

Trust: 0.3

vendor:sshmodel:communications security ipsec express toolkitscope: - version: -

Trust: 0.3

vendor:sshmodel:communications security certificate/tls toolkitscope: - version: -

Trust: 0.3

vendor:sgimodel:irixscope:eqversion:6.5.19

Trust: 0.3

vendor:redhatmodel:mgetty-sendfax-1.1.14-8.i386.rpmscope:eqversion:2.2

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.0.1

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:8.1.7

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.0.1

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:8.1.7

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.2.0

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.0.1

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:8.1.7

Trust: 0.3

vendor:oraclemodel:oracle9i application serverscope:eqversion:9.0.3

Trust: 0.3

vendor:oraclemodel:oracle9i application serverscope:eqversion:9.0.2

Trust: 0.3

vendor:oraclemodel:oracle9i application serverscope:eqversion:1.0.2.2

Trust: 0.3

vendor:oraclemodel:oracle9i application server .1sscope:eqversion:1.0.2

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.2.0

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.1

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:8.1.7

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.6

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:1.2

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:1.1

Trust: 0.3

vendor:openpkgmodel:currentscope: - version: -

Trust: 0.3

vendor:mod sslmodel:mod sslscope:eqversion:2.8.14

Trust: 0.3

vendor:intotomodel:igatewayscope:eqversion:3.2

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:11.22

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:11.11

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:11.0

Trust: 0.3

vendor:gnumodel:transport layer security libraryscope:eqversion:0.8.5

Trust: 0.3

vendor:gnumodel:transport layer security libraryscope:eqversion:0.8.4

Trust: 0.3

vendor:gnumodel:transport layer security libraryscope:eqversion:0.8.3

Trust: 0.3

vendor:gnumodel:transport layer security libraryscope:eqversion:0.8.2

Trust: 0.3

vendor:gnumodel:transport layer security libraryscope:eqversion:0.8.1

Trust: 0.3

vendor:gnumodel:transport layer security libraryscope:eqversion:0.8.0

Trust: 0.3

vendor:gnumodel:libgcryptscope:eqversion:1.1.12

Trust: 0.3

vendor:gnumodel:libgcryptscope:eqversion:1.1.11

Trust: 0.3

vendor:gnumodel:libgcryptscope:eqversion:1.1.10

Trust: 0.3

vendor:gnumodel:libgcryptscope:eqversion:1.1.9

Trust: 0.3

vendor:gnumodel:libgcryptscope:eqversion:1.1.8

Trust: 0.3

vendor:foundrymodel:networks ironviewscope: - version: -

Trust: 0.3

vendor:f5model:big-ip blade controller ptf-01scope:eqversion:4.2.3

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.4

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.3

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.2

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5

Trust: 0.3

vendor:cryptomodel:crypto++ libraryscope:eqversion:5.0

Trust: 0.3

vendor:cryptomodel:crypto++ libraryscope:eqversion:4.2

Trust: 0.3

vendor:covalentmodel:fast start serverscope:eqversion:3.3

Trust: 0.3

vendor:covalentmodel:fast start serverscope:eqversion:3.2

Trust: 0.3

vendor:covalentmodel:fast start serverscope:eqversion:3.1

Trust: 0.3

vendor:covalentmodel:enterprise ready serverscope:eqversion:2.3

Trust: 0.3

vendor:covalentmodel:enterprise ready serverscope:eqversion:2.2

Trust: 0.3

vendor:covalentmodel:enterprise ready serverscope:eqversion:2.1

Trust: 0.3

vendor:computermodel:associates etrust security command centerscope:eqversion:1.0

Trust: 0.3

vendor:compaqmodel:tru64 bscope:eqversion:5.1

Trust: 0.3

vendor:compaqmodel:tru64 ascope:eqversion:5.1

Trust: 0.3

vendor:compaqmodel:tru64scope:eqversion:5.1

Trust: 0.3

vendor:compaqmodel:tru64 ascope:eqversion:5.0

Trust: 0.3

vendor:compaqmodel:tru64 gscope:eqversion:4.0

Trust: 0.3

vendor:compaqmodel:tru64 fscope:eqversion:4.0

Trust: 0.3

vendor:compaqmodel:openvms vaxscope:eqversion:7.3

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:7.3

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:7.2.1

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:7.2-2

Trust: 0.3

vendor:compaqmodel:openvms -1h2 alphascope:eqversion:7.2

Trust: 0.3

vendor:compaqmodel:openvms -1h1 alphascope:eqversion:7.2

Trust: 0.3

vendor:compaqmodel:openvms vaxscope:eqversion:7.2

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:7.2

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:7.1-2

Trust: 0.3

vendor:compaqmodel:openvms vaxscope:eqversion:7.1

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:7.1

Trust: 0.3

vendor:compaqmodel:openvms vaxscope:eqversion:6.2

Trust: 0.3

vendor:compaqmodel:openvms alphascope:eqversion:6.2

Trust: 0.3

vendor:compaqmodel:openvmsscope:eqversion:6.2

Trust: 0.3

vendor:vandykemodel:securecrtscope:neversion:4.0.5

Trust: 0.3

vendor:opensslmodel:project openssl bscope:neversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project openssl jscope:neversion:0.9.6

Trust: 0.3

vendor:opensshmodel:opensshscope:neversion:3.6.1

Trust: 0.3

vendor:hpmodel:hp-ux apache-based web serverscope:neversion:1.0.07.01

Trust: 0.3

vendor:cryptomodel:crypto++ libraryscope:neversion:5.1

Trust: 0.3

sources: BID: 7101

EXPLOIT

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

Trust: 0.3

sources: BID: 7101

PRICE

Free

Trust: 0.3

sources: BID: 7101

TYPE

Configuration Error

Trust: 0.3

sources: BID: 7101

CREDITS

Discovery credited to David Brumley and Dan Boneh.

Trust: 0.3

sources: BID: 7101

EXTERNAL IDS

db:NVDid:CVE-2003-0147

Trust: 0.3

db:BIDid:7101

Trust: 0.3

sources: BID: 7101

REFERENCES

url:http://www.eskimo.com/~weidai/cryptlib.html

Trust: 0.3

url:http://www.openbsd.org/errata31.html#kadmin

Trust: 0.3

url:http://www.oracle.com/ip/deploy/ias/index.html

Trust: 0.3

url:http://www.covalent.net/support/rotate.php?page=109

Trust: 0.3

url:http://otn.oracle.com/deploy/security/pdf/2003alert62.pdf

Trust: 0.3

url:http://crypto.stanford.edu/~dabo/abstracts/ssl-timing.html

Trust: 0.3

url:http://www.info.apple.com/usen/security/security_updates.html

Trust: 0.3

url:http://metalink.oracle.com

Trust: 0.3

url:http://www.openbsd.org/errata32.html

Trust: 0.3

sources: BID: 7101

SOURCES

db:BIDid:7101

LAST UPDATE DATE

2022-07-27T10:02:24.513000+00:00


SOURCES UPDATE DATE

db:BIDid:7101date:2009-07-11T21:06:00

SOURCES RELEASE DATE

db:BIDid:7101date:2003-03-14T00:00:00