CVE-2003-0147 (CNNVD-200303-116)
MEDIUM
中文标题:
OpenSSL Timing攻击RSA私钥信息泄露漏洞
英文标题:
OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the ...
CVSS分数:
5.0
发布时间:
2003-03-18 05:00:00
漏洞类型:
配置错误
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
OpenSSL是OpenSSL团队开发的一个开源的能够实现安全套接层(SSL v2/v3)和安全传输层(TLS v1)协议的通用加密库,它支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL实现存在典型的定时(Timing)攻击,远程攻击者可以利用这个漏洞获得RSA私钥信息。 定时攻击一般用于攻击一些弱计算机设备,如智能卡。OpenSSL在客户端和服务器端会话密钥协商时部分定时操作存在漏洞,可导致恶意客户端获得目标服务器的RSA私钥信息。 详细分析可参看: http://crypto.stanford.edu/~dabo/abstracts/ssl-timing.html
英文描述:
OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the server's private key by determining factors using timing differences on (1) the number of extra reductions during Montgomery reduction, and (2) the use of different integer multiplication algorithms ("Karatsuba" and normal).
CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| openpkg | openpkg | * | - | - |
cpe:2.3:a:openpkg:openpkg:*:*:*:*:*:*:*:*
|
| openpkg | openpkg | 1.1 | - | - |
cpe:2.3:a:openpkg:openpkg:1.1:*:*:*:*:*:*:*
|
| openpkg | openpkg | 1.2 | - | - |
cpe:2.3:a:openpkg:openpkg:1.2:*:*:*:*:*:*:*
|
| openssl | openssl | 0.9.6 | - | - |
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
|
| openssl | openssl | 0.9.6a | - | - |
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
|
| openssl | openssl | 0.9.6b | - | - |
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
|
| openssl | openssl | 0.9.6c | - | - |
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
|
| openssl | openssl | 0.9.6d | - | - |
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
|
| openssl | openssl | 0.9.6e | - | - |
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
|
| openssl | openssl | 0.9.6g | - | - |
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
|
| openssl | openssl | 0.9.6h | - | - |
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
|
| openssl | openssl | 0.9.6i | - | - |
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
|
| openssl | openssl | 0.9.7 | - | - |
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
|
| openssl | openssl | 0.9.7a | - | - |
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.7 | - | - |
cpe:2.3:a:stunnel:stunnel:3.7:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.8 | - | - |
cpe:2.3:a:stunnel:stunnel:3.8:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.9 | - | - |
cpe:2.3:a:stunnel:stunnel:3.9:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.10 | - | - |
cpe:2.3:a:stunnel:stunnel:3.10:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.11 | - | - |
cpe:2.3:a:stunnel:stunnel:3.11:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.12 | - | - |
cpe:2.3:a:stunnel:stunnel:3.12:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.13 | - | - |
cpe:2.3:a:stunnel:stunnel:3.13:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.14 | - | - |
cpe:2.3:a:stunnel:stunnel:3.14:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.15 | - | - |
cpe:2.3:a:stunnel:stunnel:3.15:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.16 | - | - |
cpe:2.3:a:stunnel:stunnel:3.16:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.17 | - | - |
cpe:2.3:a:stunnel:stunnel:3.17:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.18 | - | - |
cpe:2.3:a:stunnel:stunnel:3.18:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.19 | - | - |
cpe:2.3:a:stunnel:stunnel:3.19:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.20 | - | - |
cpe:2.3:a:stunnel:stunnel:3.20:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.21 | - | - |
cpe:2.3:a:stunnel:stunnel:3.21:*:*:*:*:*:*:*
|
| stunnel | stunnel | 3.22 | - | - |
cpe:2.3:a:stunnel:stunnel:3.22:*:*:*:*:*:*:*
|
| stunnel | stunnel | 4.0 | - | - |
cpe:2.3:a:stunnel:stunnel:4.0:*:*:*:*:*:*:*
|
| stunnel | stunnel | 4.01 | - | - |
cpe:2.3:a:stunnel:stunnel:4.01:*:*:*:*:*:*:*
|
| stunnel | stunnel | 4.02 | - | - |
cpe:2.3:a:stunnel:stunnel:4.02:*:*:*:*:*:*:*
|
| stunnel | stunnel | 4.03 | - | - |
cpe:2.3:a:stunnel:stunnel:4.03:*:*:*:*:*:*:*
|
| stunnel | stunnel | 4.04 | - | - |
cpe:2.3:a:stunnel:stunnel:4.04:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
DSA-288
vendor-advisory
cve.org
访问
cve.org
RHSA-2003:101
vendor-advisory
cve.org
访问
cve.org
RHSA-2003:102
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
GLSA-200303-15
vendor-advisory
cve.org
访问
cve.org
20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL
mailing-list
cve.org
访问
cve.org
20030317 [ADVISORY] Timing Attack on OpenSSL
mailing-list
cve.org
访问
cve.org
CSSA-2003-014.0
vendor-advisory
cve.org
访问
cve.org
MDKSA-2003:035
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
GLSA-200303-23
vendor-advisory
cve.org
访问
cve.org
oval:org.mitre.oval:def:466
vdb-entry
cve.org
访问
cve.org
OpenPKG-SA-2003.019
vendor-advisory
cve.org
访问
cve.org
GLSA-200303-24
vendor-advisory
cve.org
访问
cve.org
IMNX-2003-7+-001-01
vendor-advisory
cve.org
访问
cve.org
20030501-01-I
vendor-advisory
cve.org
访问
cve.org
20030313 Vulnerability in OpenSSL
mailing-list
cve.org
访问
cve.org
20030320 [OpenPKG-SA-2003.026] OpenPKG Security Advisory (openssl)
mailing-list
cve.org
访问
cve.org
CLA-2003:625
vendor-advisory
cve.org
访问
cve.org
VU#997481
third-party-advisory
cve.org
访问
cve.org
20030313 OpenSSL Private Key Disclosure
mailing-list
cve.org
访问
cve.org
CVSS评分详情
5.0
MEDIUM
CVSS向量:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS版本:
2.0
机密性
PARTIAL
完整性
NONE
可用性
NONE
时间信息
发布时间:
2003-03-18 05:00:00
修改时间:
2024-08-08 01:43:35
创建时间:
2025-11-11 15:32:18
更新时间:
2025-11-11 15:48:50
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2003-0147 |
2025-11-11 15:17:26 | 2025-11-11 07:32:18 |
| NVD | nvd_CVE-2003-0147 |
2025-11-11 14:50:37 | 2025-11-11 07:41:05 |
| CNNVD | cnnvd_CNNVD-200303-116 |
2025-11-11 15:08:42 | 2025-11-11 07:48:50 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:48:50
vulnerability_type: 未提取 → 配置错误; cnnvd_id: 未提取 → CNNVD-200303-116; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 配置错误
- cnnvd_id: 未提取 -> CNNVD-200303-116
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:05
cvss_score: 未提取 → 5.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:N/A:N; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 35; references_count: 23 → 21; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.0
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:N/A:N
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 35
- references_count: 23 -> 21
- data_sources: ['cve'] -> ['cve', 'nvd']