Skip to content

Commit

Permalink
Fix typo in CVE-2019-1551 advisory
Browse files Browse the repository at this point in the history
  • Loading branch information
t8m committed Sep 10, 2024
1 parent 6fa3b92 commit 0c03eac
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion secadv/20191206.txt
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ rsaz_512_sqr overflow bug on x86_64 (CVE-2019-1551)

Severity: Low

There is an overflow bug in the x64_64 Montgomery squaring procedure used in
There is an overflow bug in the x86_64 Montgomery squaring procedure used in
exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis
suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a
result of this defect would be very difficult to perform and are not believed
Expand Down
2 changes: 1 addition & 1 deletion secjson/CVE-2019-1551.json
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@
"descriptions": [
{
"lang": "en",
"value": "There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME."
"value": "There is an overflow bug in the x86_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME."
}
],
"metrics": [
Expand Down

0 comments on commit 0c03eac

Please sign in to comment.