ID |
CVE-2000-1254
|
Summary |
crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:openssl:openssl:-:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:-:*:*:*:*:*:*:*
-
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
-
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
-
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
-
cpe:2.3:a:openssl:openssl:0.9.3:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:beta1:*:*:*:*:*:*
-
cpe:2.3:a:openssl:openssl:0.9.3:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:beta2:*:*:*:*:*:*
-
cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
-
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
-
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
-
cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
-
cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
|
CVSS |
Base: | 5.0 (as of 02-02-2017 - 02:59) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-310 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
NONE |
NONE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
refmap
via4
|
bid | 90109 | confirm | | mlist | - [openssl-users] 20000529 64 bit problem in RSA_generate_key in 0.9.5a
- [oss-security] 20160504 broken RSA keys
| sectrack | 1035750 |
|
Last major update |
02-02-2017 - 02:59 |
Published |
05-05-2016 - 01:59 |
Last modified |
02-02-2017 - 02:59 |