FreeBSD : openssl -- timing attack vulnerability (7caebe30-d7f1-11e6-a9a5-b499baebfeaf)

High Nessus Plugin ID 96412


The remote FreeBSD host is missing one or more security-related updates.


Cesar Pereida Garcia reports :

The signing function in crypto/ecdsa/ecdsa_ossl.c in certain OpenSSL versions and forks is vulnerable to timing attacks when signing with the standardized elliptic curve P-256 despite featuring constant-time curve operations and modular inversion. A software defect omits setting the BN_FLG_CONSTTIME flag for nonces, failing to take a secure code path in the BN_mod_inverse method and therefore resulting in a cache-timing attack vulnerability. A malicious user with local access can recover ECDSA P-256 private keys.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 96412

File Name: freebsd_pkg_7caebe30d7f111e6a9a5b499baebfeaf.nasl

Version: $Revision: 3.2 $

Type: local

Published: 2017/01/12

Modified: 2017/01/23

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:libressl, p-cpe:/a:freebsd:freebsd:libressl-devel, p-cpe:/a:freebsd:freebsd:openssl, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2017/01/11

Vulnerability Publication Date: 2017/01/10

Reference Information

CVE: CVE-2016-7056