Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-1551 |
CWE-ID | CWE-310 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openssl (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU23451
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-1551
CWE-ID:
CWE-310 - Cryptographic Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to an overflow issue within the rsaz_512_sqr(): the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. A remote attacker can perform an attack against DH512 keys.
Install update from vendor's website.
Vulnerable software versionsopenssl (Alpine package): 1.0.2t-r0-r0 - 1.1.1b-r1
openssl (Alpine package):
CPE2.3https://git.alpinelinux.org/aports/commit/?id=1e697147022325620c2e31c4417460f09c9df59d
https://git.alpinelinux.org/aports/commit/?id=a27739f065dcbb1cbd3d59a5afff5656ca312abc
https://git.alpinelinux.org/aports/commit/?id=d2ad91c7e3ded723ce9e34e95e66ad524f11833d
https://git.alpinelinux.org/aports/commit/?id=d5cdcefa208fa600971caccebd3ab1c7304fec16
https://git.alpinelinux.org/aports/commit/?id=33832d93c0d87e0c90f543ea973e7d12ea27a3ee
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.