CVE-2015-3193
06.12.2015, 20:59
The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.Enginsight
Vendor | Product | Version |
---|---|---|
openssl | openssl | 1.0.2 |
openssl | openssl | 1.0.2a:a |
openssl | openssl | 1.0.2b:b |
openssl | openssl | 1.0.2c:c |
openssl | openssl | 1.0.2d:d |
nodejs | node.js | 4.0.0 ≤ 𝑥 ≤ 4.1.2 |
nodejs | node.js | 4.2.0 ≤ 𝑥 < 4.2.3 |
nodejs | node.js | 5.0.0 ≤ 𝑥 < 5.1.1 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 15.04 |
canonical | ubuntu_linux | 15.10 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966