CVE-2019-13628
03.10.2019, 14:15
wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of signature operations, to infer information about the nonces used and potentially mount a lattice attack to recover the private key used. The issue occurs because ecc.c scalar multiplication might leak the bit length.Enginsight
Vendor | Product | Version |
---|---|---|
wolfssl | wolfssl | 𝑥 ≤ 4.0.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References