First published: Thu Oct 03 2019(Updated: )
MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Matrixssl Matrixssl | <=4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-13629.
The severity of CVE-2019-13629 is medium with a CVSS score of 5.9.
The affected software version of CVE-2019-13629 is MatrixSSL 4.2.1 and earlier.
The timing side channel in ECDSA signature generation allows an attacker to compute the private key used, if they can measure the duration of signing operations.
Yes, there are references related to CVE-2019-13629. They can be found at the following links: http://www.openwall.com/lists/oss-security/2019/10/02/2, https://eprint.iacr.org/2011/232.pdf, https://minerva.crocs.fi.muni.cz/