FreeBSD : polarssl -- Timing attack against protected RSA-CRT implementation (ccefac3e-2aed-11e3-af10-000c29789cb5)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

PolarSSL Project reports :

The researchers Cyril Arnaud and Pierre-Alain Fouque investigated the
PolarSSL RSA implementation and discovered a bias in the
implementation of the Montgomery multiplication that we used. For
which they then show that it can be used to mount an attack on the RSA
key. Although their test attack is done on a local system, there seems
to be enough indication that this can properly be performed from a
remote system as well.

All versions prior to PolarSSL 1.2.9 and 1.3.0 are affected if a third
party can send arbitrary handshake messages to your server.

If correctly executed, this attack reveals the entire private RSA key
after a large number of attack messages (> 600.000 on a local machine)
are sent to show the timing differences.

See also :

http://www.nessus.org/u?37fce654
https://polarssl.org/tech-updates/releases/polarssl-1.2.9-released
http://www.nessus.org/u?ab72ea67

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 70264 ()

Bugtraq ID:

CVE ID: CVE-2013-5915

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now