Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2011-4354

Published: 26 January 2012

crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.

Priority

Medium

Status

Package Release Status
openssl
Launchpad, Ubuntu, Debian
upstream
Released (0.9.8h)
hardy
Released (0.9.8g-4ubuntu3.15)
lucid Not vulnerable
(0.9.8k-7ubuntu8.6)
maverick Not vulnerable

natty Not vulnerable

oneiric Not vulnerable

Patches:
upstream: update to http://cvs.openssl.org/fileview?f=openssl/crypto/bn/bn_nist.c&v=1.20