Your submission was sent successfully! Close

CVE-2011-4354

Published: 26 January 2012

crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.

Priority

Medium

Status

Package Release Status
openssl
Launchpad, Ubuntu, Debian
Upstream
Released (0.9.8h)
Patches:
Upstream: update to http://cvs.openssl.org/fileview?f=openssl/crypto/bn/bn_nist.c&v=1.20