ID

VAR-200111-0010


CVE

CVE-2001-0903


TITLE

Intel HDCP Authentication Key Linear Correlation Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200111-020

DESCRIPTION

Linear key exchange process in High-bandwidth Digital Content Protection (HDCP) System allows remote attackers to access data as plaintext, avoid device blacklists, clone devices, and create new device keyvectors by computing and using alternate key combinations for authentication. Intel's High-bandwidth Digital Content Protection (HDCP) is a specification for authentication and encryption of multimedia streams. Content encryption and authentication of a playback device are based on a public/private key pair. Authentication is accomplished by a linear combination of private key values, based on the public key. As a direct result, being able to express an arbitrary public key as a linear combination of known public/private key pairs allows an attacker to authenticate as the arbitrary device. This results in a large number of possible exploits, with varying degrees of computation required. As an example, an attacker able to eavesdrop on an encrypted stream may compute the shared secret, and view the decrypted content. Although a computationally efficient algorithm has not yet been published, it may also be possible to create new, valid keys that are a linear combination of known values. Currently this may be done by enumerating all possible well formed public keys, and testing for validity

Trust: 1.26

sources: NVD: CVE-2001-0903 // BID: 3558 // VULHUB: VHN-3710

AFFECTED PRODUCTS

vendor:intelmodel:high-bandwidth digital content protectionscope:eqversion:1.0

Trust: 1.9

sources: BID: 3558 // CNNVD: CNNVD-200111-020 // NVD: CVE-2001-0903

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-0903
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200111-020
value: HIGH

Trust: 0.6

VULHUB: VHN-3710
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2001-0903
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-3710
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-3710 // CNNVD: CNNVD-200111-020 // NVD: CVE-2001-0903

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-0903

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200111-020

TYPE

Design Error

Trust: 0.9

sources: BID: 3558 // CNNVD: CNNVD-200111-020

EXTERNAL IDS

db:BIDid:3558

Trust: 2.0

db:NVDid:CVE-2001-0903

Trust: 1.7

db:CNNVDid:CNNVD-200111-020

Trust: 0.7

db:BUGTRAQid:20011120 A CRYPTANALYSIS OF THE HIGH-BANDWIDTH DIGITAL CONTENT PROTECTION SYSTEM

Trust: 0.6

db:XFid:7612

Trust: 0.6

db:VULHUBid:VHN-3710

Trust: 0.1

sources: VULHUB: VHN-3710 // BID: 3558 // CNNVD: CNNVD-200111-020 // NVD: CVE-2001-0903

REFERENCES

url:http://www.securityfocus.com/bid/3558

Trust: 1.7

url:http://www.iss.net/security_center/static/7612.php

Trust: 1.7

url:http://nunce.org/hdcp/hdcp111901.htm

Trust: 1.4

url:http://marc.info/?l=bugtraq&m=100626641009560&w=2

Trust: 1.0

url:http://marc.theaimsgroup.com/?l=bugtraq&m=100626641009560&w=2

Trust: 0.6

url:http://www.cryptome.org/hdcp-weakness.htm

Trust: 0.3

url:http://www.digital-cp.com/

Trust: 0.3

url:http://marc.info/?l=bugtraq&m=100626641009560&w=2

Trust: 0.1

sources: VULHUB: VHN-3710 // BID: 3558 // CNNVD: CNNVD-200111-020 // NVD: CVE-2001-0903

CREDITS

Discovered independantly by Scott Crosby, Ian Goldberg, Robert Johnson, Dawn Song and David Wagner and presented at the ACM-CCS8 DRM workshop on November 5, 2001.

Trust: 0.9

sources: BID: 3558 // CNNVD: CNNVD-200111-020

SOURCES

db:VULHUBid:VHN-3710
db:BIDid:3558
db:CNNVDid:CNNVD-200111-020
db:NVDid:CVE-2001-0903

LAST UPDATE DATE

2025-04-03T22:40:46.079000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-3710date:2016-10-18T00:00:00
db:BIDid:3558date:2001-11-05T00:00:00
db:CNNVDid:CNNVD-200111-020date:2006-08-09T00:00:00
db:NVDid:CVE-2001-0903date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:VULHUBid:VHN-3710date:2001-11-20T00:00:00
db:BIDid:3558date:2001-11-05T00:00:00
db:CNNVDid:CNNVD-200111-020date:2001-11-20T00:00:00
db:NVDid:CVE-2001-0903date:2001-11-20T05:00:00