Description
MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.
Published: 2019-10-03
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-5060 MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.
History

No history.

Subscriptions

Matrixssl Matrixssl
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:57:39.514Z

Reserved: 2019-07-17T00:00:00.000Z

Link: CVE-2019-13629

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-03T14:15:11.150

Modified: 2024-11-21T04:25:24.060

Link: CVE-2019-13629

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses