CVE-2003-0147

Source
https://nvd.nist.gov/vuln/detail/CVE-2003-0147
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2003-0147.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2003-0147
Related
Published
2003-03-31T05:00:00Z
Modified
2024-11-20T23:44:05Z
Summary
[none]
Details

OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the server's private key by determining factors using timing differences on (1) the number of extra reductions during Montgomery reduction, and (2) the use of different integer multiplication algorithms ("Karatsuba" and normal).

References

Affected packages

Debian:11 / openssl

Package

Name
openssl
Purl
pkg:deb/debian/openssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.7b-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / openssl

Package

Name
openssl
Purl
pkg:deb/debian/openssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.7b-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / openssl

Package

Name
openssl
Purl
pkg:deb/debian/openssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.7b-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}