First published: Tue Mar 18 2003(Updated: )
OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the server's private key by determining factors using timing differences on (1) the number of extra reductions during Montgomery reduction, and (2) the use of different integer multiplication algorithms ("Karatsuba" and normal).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
stunnel | =4.02 | |
OpenSSL libcrypto | =0.9.6i | |
stunnel | =3.7 | |
OpenSSL libcrypto | =0.9.6d | |
OpenSSL libcrypto | =0.9.6 | |
OpenSSL libcrypto | =0.9.6a | |
stunnel | =3.14 | |
stunnel | =3.22 | |
stunnel | =3.18 | |
OpenSSL libcrypto | =0.9.6h | |
OpenSSL libcrypto | =0.9.7 | |
stunnel | =3.15 | |
stunnel | =3.16 | |
stunnel | =3.8 | |
stunnel | =3.11 | |
stunnel | =3.12 | |
stunnel | =3.20 | |
openpkg openpkg | =1.1 | |
OpenSSL libcrypto | =0.9.6e | |
OpenSSL libcrypto | =0.9.6g | |
stunnel | =3.13 | |
stunnel | =3.21 | |
stunnel | =4.04 | |
OpenSSL libcrypto | =0.9.6b | |
stunnel | =3.10 | |
stunnel | =3.17 | |
stunnel | =3.9 | |
openpkg openpkg | =1.2 | |
OpenSSL libcrypto | =0.9.6c | |
stunnel | =3.19 | |
stunnel | =4.01 | |
openpkg openpkg | ||
stunnel | =4.03 | |
OpenSSL libcrypto | =0.9.7a | |
stunnel | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0147 is considered high severity as it allows attackers to potentially obtain the private key of a server.
To fix CVE-2003-0147, upgrade OpenSSL to a version that implements RSA blinding by default.
CVE-2003-0147 affects OpenSSL versions up to and including 0.9.7.
Yes, Stunnel versions up to 4.02 are affected by CVE-2003-0147.
CVE-2003-0147 can be exploited through timing attacks that reveal information about the server's private key.