First published: Fri Oct 04 2013(Updated: )
The RSA-CRT implementation in PolarSSL before 1.2.9 does not properly perform Montgomery multiplication, which might allow remote attackers to conduct a timing side-channel attack and retrieve RSA private keys.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PolarSSL | <=1.2.8 | |
PolarSSL | =0.10.0 | |
PolarSSL | =0.10.1 | |
PolarSSL | =0.11.0 | |
PolarSSL | =0.11.1 | |
PolarSSL | =0.12.0 | |
PolarSSL | =0.12.1 | |
PolarSSL | =0.13.1 | |
PolarSSL | =0.14.0 | |
PolarSSL | =0.14.2 | |
PolarSSL | =0.14.3 | |
PolarSSL | =0.99-pre1 | |
PolarSSL | =0.99-pre3 | |
PolarSSL | =0.99-pre4 | |
PolarSSL | =0.99-pre5 | |
PolarSSL | =1.0.0 | |
PolarSSL | =1.1.0 | |
PolarSSL | =1.1.0-rc0 | |
PolarSSL | =1.1.0-rc1 | |
PolarSSL | =1.1.1 | |
PolarSSL | =1.1.2 | |
PolarSSL | =1.1.3 | |
PolarSSL | =1.1.4 | |
PolarSSL | =1.1.5 | |
PolarSSL | =1.1.6 | |
PolarSSL | =1.1.8 | |
PolarSSL | =1.2.0 | |
PolarSSL | =1.2.1 | |
PolarSSL | =1.2.2 | |
PolarSSL | =1.2.3 | |
PolarSSL | =1.2.4 | |
PolarSSL | =1.2.5 | |
PolarSSL | =1.2.6 | |
PolarSSL | =1.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5915 is classified as a medium severity vulnerability due to potential exposure of RSA private keys via timing side-channel attacks.
To fix CVE-2013-5915, upgrade PolarSSL to version 1.2.9 or later, which contains the necessary security patches.
CVE-2013-5915 affects PolarSSL versions prior to 1.2.9, including versions 0.10.0 through 1.2.8.
CVE-2013-5915 can be exploited through remote timing side-channel attacks that may lead to the exposure of private RSA keys.
CVE-2013-5915 specifically involves vulnerabilities in the RSA-CRT implementation and Montgomery multiplication of PolarSSL.