MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-5060 MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:57:39.514Z

Reserved: 2019-07-17T00:00:00

Link: CVE-2019-13629

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-03T14:15:11.150

Modified: 2024-11-21T04:25:24.060

Link: CVE-2019-13629

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses