First published: Fri Jan 22 2016(Updated: )
wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
wolfSSL | <3.6.8 | |
openSUSE | =42.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Mariadb Mariadb | >=5.5.0<5.5.46 | |
Mariadb Mariadb | >=10.0.0<10.0.22 | |
Mariadb Mariadb | >=10.1.0<10.1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7744 is classified as a high severity vulnerability as it can lead to the exposure of private RSA keys.
To fix CVE-2015-7744, update wolfSSL to version 3.6.8 or higher to ensure proper handling of CRT faults.
Versions of wolfSSL prior to 3.6.8 are affected by CVE-2015-7744.
CVE-2015-7744 affects wolfSSL, various versions of MariaDB, and certain versions of openSUSE.
Yes, CVE-2015-7744 can be exploited remotely by attackers to capture private RSA keys during TLS sessions.