MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because crypto/pubkey/ecc_math.c scalar multiplication leaks the bit length of the scalar.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
https://eprint.iacr.org/2011/232.pdf | not applicable |
https://tches.iacr.org/index.php/TCHES/article/view/7337 | not applicable |
http://www.openwall.com/lists/oss-security/2019/10/02/2 | third party advisory mailing list |
https://minerva.crocs.fi.muni.cz/ | product |