低危 Oracle Enterprise Manager Base Platform 12.1.0.5/13.2.0.0 Discovery Framework 信息泄漏漏洞

CVE编号

CVE-2017-3736

利用情况

暂无

补丁情况

官方补丁

披露时间

2017-11-03 06:29:00
漏洞描述
OpenSSL中的 x86_64 Montgomery squaring procedure在1.0.2m之前和1.1.0g之前存在一个进位传播错误。不影响EC算法。分析表明,由于这一缺陷而对RSA和DSA进行攻击将非常困难,而且不太可能。对DH的攻击被认为是可行的(尽管非常困难),因为推断关于私有密匙的信息所需的大部分工作可能在脱机情况下执行。此类攻击所需的资源数量将非常大,并且可能只对有限数量的攻击者开放。在具有持久的DH参数和在多个客户机之间共享的私有密钥的场景中,攻击者还需要使用目标私有密钥在线访问未修补的系统。这只会影响到支持BMI1、BMI2和ADX扩展的处理器,比如Intel Broadwell(第5代)以及后来的AMD Ryzen。
解决建议
厂商已发布漏洞修复程序,请及时关注更新:
https://www.openssl.org/news/secadv/20171102.txt
参考链接
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/101666
http://www.securitytracker.com/id/1039727
https://access.redhat.com/errata/RHSA-2018:0998
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
https://access.redhat.com/errata/RHSA-2018:2568
https://access.redhat.com/errata/RHSA-2018:2575
https://access.redhat.com/errata/RHSA-2018:2713
https://github.com/openssl/openssl/commit/4443cf7aa0099e5ce615c18cee249fff77fb0871
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc
https://security.gentoo.org/glsa/201712-03
https://security.netapp.com/advisory/ntap-20171107-0002/
https://security.netapp.com/advisory/ntap-20180117-0002/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-...
https://www.debian.org/security/2017/dsa-4017
https://www.debian.org/security/2017/dsa-4018
https://www.openssl.org/news/secadv/20171102.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2017-14
https://www.tenable.com/security/tns-2017-15
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 openssl openssl * From
(including)
1.0.2
Up to
(excluding)
1.0.2m
运行在以下环境
应用 openssl openssl * From
(including)
1.1.0
Up to
(excluding)
1.1.0g
2
运行在以下环境
系统 amazon_AMI openssl * Up to
(excluding)
1.0.2k-12.109.amzn1
3
运行在以下环境
系统 alpine_3.3 openssl * Up to
(excluding)
1.0.2m-r0
4
运行在以下环境
系统 amazon_2 openssl * Up to
(excluding)
1.0.2k-12.amzn2.0.1
5
运行在以下环境
系统 alpine_3.4 openssl * Up to
(excluding)
1.0.2m-r0
6
运行在以下环境
系统 alpine_3.5 openssl * Up to
(excluding)
1.0.2m-r0
7
运行在以下环境
系统 alpine_3.6 openssl * Up to
(excluding)
1.0.2m-r0
8
运行在以下环境
系统 alpine_3.8 openssl * Up to
(excluding)
1.0.2m-r0
9
运行在以下环境
系统 alpine_3.7 openssl * Up to
(excluding)
1.0.2m-r0
10
运行在以下环境
系统 debian_9 openssl * Up to
(excluding)
1.1.0f-3+deb9u2
11
运行在以下环境
系统 opensuse_Leap_42.3 openssl * Up to
(excluding)
6.12.2-6.1
12
运行在以下环境
系统 opensuse_Leap_42.2 openssl * Up to
(excluding)
4.8.7-11.1
13
运行在以下环境
系统 suse_12_SP3 openssl * Up to
(excluding)
1.8.0_sr5.20-30.36.1
14
运行在以下环境
系统 oracle_7 openssl * Up to
(excluding)
1.0.2k-16.0.1.ksplice1.el7_6.1
15
运行在以下环境
系统 suse_12_SP2 openssl * Up to
(excluding)
1.0.2j-60.16.1
16
运行在以下环境
系统 fedora_26 openssl * Up to
(excluding)
1.0.2m-1.fc26
17
运行在以下环境
系统 fedora_25 openssl * Up to
(excluding)
1.0.2m-1.fc25
18
运行在以下环境
系统 fedora_27 openssl * Up to
(excluding)
1.0.2m-1.fc27
阿里云评分
2.7
  • 攻击路径
    远程
  • 攻击复杂度
    复杂
  • 权限要求
    普通权限
  • 影响范围
    有限影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    100
CWE-ID 漏洞类型
CWE-200 信息暴露
阿里云安全产品覆盖情况