FreeBSD : polarssl -- Timing attack against protected RSA-CRT implementation (ccefac3e-2aed-11e3-af10-000c29789cb5)

medium Nessus Plugin ID 70264

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

PolarSSL Project reports :

The researchers Cyril Arnaud and Pierre-Alain Fouque investigated the PolarSSL RSA implementation and discovered a bias in the implementation of the Montgomery multiplication that we used. For which they then show that it can be used to mount an attack on the RSA key. Although their test attack is done on a local system, there seems to be enough indication that this can properly be performed from a remote system as well.

All versions prior to PolarSSL 1.2.9 and 1.3.0 are affected if a third party can send arbitrary handshake messages to your server.

If correctly executed, this attack reveals the entire private RSA key after a large number of attack messages (> 600.000 on a local machine) are sent to show the timing differences.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?37fce654

https://tls.mbed.org/tech-updates/releases/polarssl-1.2.9-released

http://www.nessus.org/u?f3f3dc6b

Plugin Details

Severity: Medium

ID: 70264

File Name: freebsd_pkg_ccefac3e2aed11e3af10000c29789cb5.nasl

Version: 1.7

Type: local

Published: 10/2/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:polarssl, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/2/2013

Vulnerability Publication Date: 10/1/2013

Reference Information

CVE: CVE-2013-5915