Overview
OpenSSL may generate unsafe primes for use in the Diffie-Hellman protocol, which may lead to disclosure of enough information for an attacker to recover the private encryption key.
Description
CWE-325: Missing Required Cryptographic Step - CVE-2016-0701 OpenSSL 1.0.2 introduced the ability to generate X9.42 style parameter files as required by RFC 5114. The primes generated in this mode may be 'unsafe', enabling generation of groups containing small subgroups, which may allow for cryptographic attacks that may recover the key. OpenSSL prior to 1.0.2f did not properly check for this possibility. |
Impact
A malicious remote user may be able to learn sensitive information by obtaining the decryption key. A remote attacker may also be able to negotiate for weak SSLv2 ciphers even if the SSLv2 ciphers have been disabled, allowing for further known attacks. |
Solution
Apply an update |
Enable SSL_OP_SINGLE_DH_USE option |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 8.8 | AV:N/AC:M/Au:N/C:C/I:C/A:N |
Temporal | 6.9 | E:POC/RL:OF/RC:C |
Environmental | 6.9 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- https://www.openssl.org/news/vulnerabilities.html#y2016
- https://mta.openssl.org/pipermail/openssl-announce/2016-January/000061.html
- http://intothesymmetry.blogspot.com/2016/01/openssl-key-recovery-attack-on-dh-small.html
- http://tools.ietf.org/html/rfc5114
- http://webstore.ansi.org/RecordDetail.aspx?sku=ANSI+X9.42-2003+%28R2013%29
Acknowledgements
OpenSSL credits Antonio Sanso of Adobe for reporting CVE-2016-0701, and Nimrod Aviram and Sebastian Schinzel for reporting CVE-2015-3197.
This document was written by Garret Wassermann.
Other Information
CVE IDs: | CVE-2016-0701, CVE-2015-3197 |
Date Public: | 2016-01-28 |
Date First Published: | 2016-01-28 |
Date Last Updated: | 2016-01-29 18:01 UTC |
Document Revision: | 54 |