CVE-2011-4354
Published: 26 January 2012
crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.
Priority
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
upstream |
Released
(0.9.8h)
|
hardy |
Released
(0.9.8g-4ubuntu3.15)
|
|
lucid |
Not vulnerable
(0.9.8k-7ubuntu8.6)
|
|
maverick |
Not vulnerable
|
|
natty |
Not vulnerable
|
|
oneiric |
Not vulnerable
|
|
Patches: upstream: update to http://cvs.openssl.org/fileview?f=openssl/crypto/bn/bn_nist.c&v=1.20 |