First published: Wed Jan 11 2017(Updated: )
A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
OpenSSL libcrypto | <=1.0.1u | |
Debian | =8.0 | |
Debian | =9.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.4.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7056 has a high severity rating due to its potential to allow local users to recover private keys.
To fix CVE-2016-7056, update OpenSSL to versions 1.1.1w or later, or apply relevant patches provided by your Linux distribution.
CVE-2016-7056 affects OpenSSL versions 1.0.1u and earlier.
CVE-2016-7056 cannot be exploited remotely as it requires local access to the vulnerable system.
A successful exploit of CVE-2016-7056 may allow an attacker to recover ECDSA P-256 private keys, compromising the security of encrypted communications.