CVE-2003-0147 (CNNVD-200303-116)

MEDIUM
中文标题:
OpenSSL Timing攻击RSA私钥信息泄露漏洞
英文标题:
OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the ...
CVSS分数: 5.0
发布时间: 2003-03-18 05:00:00
漏洞类型: 配置错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

OpenSSL是OpenSSL团队开发的一个开源的能够实现安全套接层(SSL v2/v3)和安全传输层(TLS v1)协议的通用加密库,它支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL实现存在典型的定时(Timing)攻击,远程攻击者可以利用这个漏洞获得RSA私钥信息。 定时攻击一般用于攻击一些弱计算机设备,如智能卡。OpenSSL在客户端和服务器端会话密钥协商时部分定时操作存在漏洞,可导致恶意客户端获得目标服务器的RSA私钥信息。 详细分析可参看: http://crypto.stanford.edu/~dabo/abstracts/ssl-timing.html

英文描述:

OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the server's private key by determining factors using timing differences on (1) the number of extra reductions during Montgomery reduction, and (2) the use of different integer multiplication algorithms ("Karatsuba" and normal).

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
openpkg openpkg * - - cpe:2.3:a:openpkg:openpkg:*:*:*:*:*:*:*:*
openpkg openpkg 1.1 - - cpe:2.3:a:openpkg:openpkg:1.1:*:*:*:*:*:*:*
openpkg openpkg 1.2 - - cpe:2.3:a:openpkg:openpkg:1.2:*:*:*:*:*:*:*
openssl openssl 0.9.6 - - cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
openssl openssl 0.9.6a - - cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
openssl openssl 0.9.6b - - cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
openssl openssl 0.9.6c - - cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
openssl openssl 0.9.6d - - cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
openssl openssl 0.9.6e - - cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
openssl openssl 0.9.6g - - cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
openssl openssl 0.9.6h - - cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
openssl openssl 0.9.6i - - cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
openssl openssl 0.9.7 - - cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
openssl openssl 0.9.7a - - cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
stunnel stunnel 3.7 - - cpe:2.3:a:stunnel:stunnel:3.7:*:*:*:*:*:*:*
stunnel stunnel 3.8 - - cpe:2.3:a:stunnel:stunnel:3.8:*:*:*:*:*:*:*
stunnel stunnel 3.9 - - cpe:2.3:a:stunnel:stunnel:3.9:*:*:*:*:*:*:*
stunnel stunnel 3.10 - - cpe:2.3:a:stunnel:stunnel:3.10:*:*:*:*:*:*:*
stunnel stunnel 3.11 - - cpe:2.3:a:stunnel:stunnel:3.11:*:*:*:*:*:*:*
stunnel stunnel 3.12 - - cpe:2.3:a:stunnel:stunnel:3.12:*:*:*:*:*:*:*
stunnel stunnel 3.13 - - cpe:2.3:a:stunnel:stunnel:3.13:*:*:*:*:*:*:*
stunnel stunnel 3.14 - - cpe:2.3:a:stunnel:stunnel:3.14:*:*:*:*:*:*:*
stunnel stunnel 3.15 - - cpe:2.3:a:stunnel:stunnel:3.15:*:*:*:*:*:*:*
stunnel stunnel 3.16 - - cpe:2.3:a:stunnel:stunnel:3.16:*:*:*:*:*:*:*
stunnel stunnel 3.17 - - cpe:2.3:a:stunnel:stunnel:3.17:*:*:*:*:*:*:*
stunnel stunnel 3.18 - - cpe:2.3:a:stunnel:stunnel:3.18:*:*:*:*:*:*:*
stunnel stunnel 3.19 - - cpe:2.3:a:stunnel:stunnel:3.19:*:*:*:*:*:*:*
stunnel stunnel 3.20 - - cpe:2.3:a:stunnel:stunnel:3.20:*:*:*:*:*:*:*
stunnel stunnel 3.21 - - cpe:2.3:a:stunnel:stunnel:3.21:*:*:*:*:*:*:*
stunnel stunnel 3.22 - - cpe:2.3:a:stunnel:stunnel:3.22:*:*:*:*:*:*:*
stunnel stunnel 4.0 - - cpe:2.3:a:stunnel:stunnel:4.0:*:*:*:*:*:*:*
stunnel stunnel 4.01 - - cpe:2.3:a:stunnel:stunnel:4.01:*:*:*:*:*:*:*
stunnel stunnel 4.02 - - cpe:2.3:a:stunnel:stunnel:4.02:*:*:*:*:*:*:*
stunnel stunnel 4.03 - - cpe:2.3:a:stunnel:stunnel:4.03:*:*:*:*:*:*:*
stunnel stunnel 4.04 - - cpe:2.3:a:stunnel:stunnel:4.04:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
DSA-288 vendor-advisory
cve.org
访问
RHSA-2003:101 vendor-advisory
cve.org
访问
RHSA-2003:102 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
GLSA-200303-15 vendor-advisory
cve.org
访问
20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL mailing-list
cve.org
访问
20030317 [ADVISORY] Timing Attack on OpenSSL mailing-list
cve.org
访问
CSSA-2003-014.0 vendor-advisory
cve.org
访问
MDKSA-2003:035 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
GLSA-200303-23 vendor-advisory
cve.org
访问
oval:org.mitre.oval:def:466 vdb-entry
cve.org
访问
OpenPKG-SA-2003.019 vendor-advisory
cve.org
访问
GLSA-200303-24 vendor-advisory
cve.org
访问
IMNX-2003-7+-001-01 vendor-advisory
cve.org
访问
20030501-01-I vendor-advisory
cve.org
访问
20030313 Vulnerability in OpenSSL mailing-list
cve.org
访问
20030320 [OpenPKG-SA-2003.026] OpenPKG Security Advisory (openssl) mailing-list
cve.org
访问
CLA-2003:625 vendor-advisory
cve.org
访问
VU#997481 third-party-advisory
cve.org
访问
20030313 OpenSSL Private Key Disclosure mailing-list
cve.org
访问
CVSS评分详情
5.0
MEDIUM
CVSS向量: AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS版本: 2.0
机密性
PARTIAL
完整性
NONE
可用性
NONE
时间信息
发布时间:
2003-03-18 05:00:00
修改时间:
2024-08-08 01:43:35
创建时间:
2025-11-11 15:32:18
更新时间:
2025-11-11 15:48:50
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2003-0147 2025-11-11 15:17:26 2025-11-11 07:32:18
NVD nvd_CVE-2003-0147 2025-11-11 14:50:37 2025-11-11 07:41:05
CNNVD cnnvd_CNNVD-200303-116 2025-11-11 15:08:42 2025-11-11 07:48:50
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:48:50
vulnerability_type: 未提取 → 配置错误; cnnvd_id: 未提取 → CNNVD-200303-116; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 配置错误
  • cnnvd_id: 未提取 -> CNNVD-200303-116
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:05
cvss_score: 未提取 → 5.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:N/A:N; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 35; references_count: 23 → 21; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 5.0
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:N/A:N
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 35
  • references_count: 23 -> 21
  • data_sources: ['cve'] -> ['cve', 'nvd']