Description
The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.
Published: 2015-12-06
Score: 7.5 High
EPSS: 30.5% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-2830-1 OpenSSL vulnerabilities
References
Link Providers
http://fortiguard.com/advisory/openssl-advisory-december-2015 cve-icon cve-icon
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 cve-icon cve-icon
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 cve-icon cve-icon
http://openssl.org/news/secadv/20151203.txt cve-icon cve-icon
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl cve-icon cve-icon
http://www.fortiguard.com/advisory/openssl-advisory-december-2015 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html cve-icon cve-icon
http://www.securityfocus.com/bid/78705 cve-icon cve-icon
http://www.securityfocus.com/bid/91787 cve-icon cve-icon
http://www.securitytracker.com/id/1034294 cve-icon cve-icon
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966 cve-icon cve-icon
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2830-1 cve-icon cve-icon
https://blog.fuzzing-project.org/31-Fuzzing-Math-miscalculations-in-OpenSSLs-BN_mod_exp-CVE-2015-3193.html cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1288317 cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf cve-icon cve-icon
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d73cc256c8e256c32ed959456101b73ba9842f72 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322 cve-icon cve-icon
https://kb.isc.org/article/AA-01438 cve-icon cve-icon
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2015-3193 cve-icon
https://openssl.org/news/secadv/20151203.txt cve-icon
https://www.cve.org/CVERecord?id=CVE-2015-3193 cve-icon
History

No history.

Subscriptions

Canonical Ubuntu Linux
Nodejs Node.js
Openssl Openssl
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T05:39:32.068Z

Reserved: 2015-04-10T00:00:00.000Z

Link: CVE-2015-3193

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2015-12-06T20:59:02.613

Modified: 2026-05-06T22:30:45.220

Link: CVE-2015-3193

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-12-03T00:00:00Z

Links: CVE-2015-3193 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses