BSA-2017-383
21388
13 October 2017
25 August 2017
Closed
Medium
5.5
N/A
CVE-2016-7056
Summary
Security Advisory ID : BSA-2017-383
Component : OpenSSL
Revision : 2.0: Interim
The signing function in crypto/ecdsa/ecdsa_ossl.c in certain OpenSSL versions and forks is vulnerable to timing attacks when signing with the standardized elliptic curve P-256 despite featuring constant-time curve operations and modular inversion. A software defect omits setting the BN_FLG_CONSTTIME flag for nonces, failing to take a secure code path in the BN_mod_inverse method and therefore resulting in a cache-timing attack vulnerability. A malicious user with local access can recover ECDSA P-256 private keys.
Affected ProductsBrocade is investigating its product lines to determine which products may be affected by this vulnerability and the impact on each affected product.
Products Confirmed Not VulnerableBrocade Fabric OS, Brocade ServerIron ADX, and Brocade Workflow Composer is confirmed not affected by this vulnerability.
WorkaroundThere are no workarounds that address this vulnerability.
Revision History
Version | Change | Date |
---|---|---|
1.0 | Initial Publication | August 25, 2017 |
2.0 | Updated to address ADX & WC | October 13, 2017 |