FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2016-0702

This CVE name corresponds to:

Entered Topic
2016-08-11 FreeBSD -- Multiple OpenSSL vulnerabilities
2016-03-14 node -- multiple vulnerabilities

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2016-0702
Phase Assigned(20151216)

Description

The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.

References

Source Reference
MISC http://cachebleed.info
CONFIRM http://openssl.org/news/secadv/20160301.txt
CONFIRM https://git.openssl.org/?p=openssl.git;a=commit;h=708dc2f1291e104fe4eef810bb8ffc1fae5b19c1
CONFIRM https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
SUSE openSUSE-SU-2016:1566