{ "schema_version": "1.4.0", "id": "GHSA-r4rf-h58w-4p76", "modified": "2022-05-17T05:08:47Z", "published": "2022-05-17T05:08:47Z", "aliases": [ "CVE-2011-1945" ], "details": "The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1945" }, { "type": "WEB", "url": "https://hermes.opensuse.org/messages/8760466" }, { "type": "WEB", "url": "https://hermes.opensuse.org/messages/8764170" }, { "type": "WEB", "url": "http://eprint.iacr.org/2011/232.pdf" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/44935" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5784" }, { "type": "WEB", "url": "http://www.debian.org/security/2011/dsa-2309" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/536044" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/MAPG-8FENZ3" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:136" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:137" } ], "database_specific": { "cwe_ids": [], "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-05-31T20:55:00Z" } }