低危 Oracle Enterprise Manager Base Platform 12.1.0.5/13.2.0.0 Discovery Framework 信息泄漏漏洞

CVE编号

CVE-2017-3736

利用情况

暂无

补丁情况

官方补丁

披露时间

2017-11-03
漏洞描述
OpenSSL中的 x86_64 Montgomery squaring procedure在1.0.2m之前和1.1.0g之前存在一个进位传播错误。不影响EC算法。分析表明,由于这一缺陷而对RSA和DSA进行攻击将非常困难,而且不太可能。对DH的攻击被认为是可行的(尽管非常困难),因为推断关于私有密匙的信息所需的大部分工作可能在脱机情况下执行。此类攻击所需的资源数量将非常大,并且可能只对有限数量的攻击者开放。在具有持久的DH参数和在多个客户机之间共享的私有密钥的场景中,攻击者还需要使用目标私有密钥在线访问未修补的系统。这只会影响到支持BMI1、BMI2和ADX扩展的处理器,比如Intel Broadwell(第5代)以及后来的AMD Ryzen。

解决建议
厂商已发布漏洞修复程序,请及时关注更新:
https://www.openssl.org/news/secadv/20171102.txt
参考链接
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/101666
http://www.securitytracker.com/id/1039727
https://access.redhat.com/errata/RHSA-2018:0998
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
https://access.redhat.com/errata/RHSA-2018:2568
https://access.redhat.com/errata/RHSA-2018:2575
https://access.redhat.com/errata/RHSA-2018:2713
https://github.com/openssl/openssl/commit/4443cf7aa0099e5ce615c18cee249fff77fb0871
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc
https://security.gentoo.org/glsa/201712-03
https://security.netapp.com/advisory/ntap-20171107-0002/
https://security.netapp.com/advisory/ntap-20180117-0002/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-...
https://www.debian.org/security/2017/dsa-4017
https://www.debian.org/security/2017/dsa-4018
https://www.openssl.org/news/secadv/20171102.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2017-14
https://www.tenable.com/security/tns-2017-15
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 openssl openssl * From
(including)
1.0.2
Up to
(excluding)
1.0.2m
运行在以下环境
应用 openssl openssl * From
(including)
1.1.0
Up to
(excluding)
1.1.0g
运行在以下环境
系统 alpine_3.3 openssl * Up to
(excluding)
1.0.2m-r0
运行在以下环境
系统 alpine_3.4 openssl * Up to
(excluding)
1.0.2m-r0
运行在以下环境
系统 alpine_3.5 openssl * Up to
(excluding)
1.0.2m-r0
运行在以下环境
系统 alpine_3.6 openssl * Up to
(excluding)
1.0.2m-r0
运行在以下环境
系统 alpine_3.7 openssl * Up to
(excluding)
1.0.2m-r0
运行在以下环境
系统 alpine_3.8 openssl * Up to
(excluding)
1.0.2m-r0
运行在以下环境
系统 amazon_2 openssl * Up to
(excluding)
1.0.2k-12.amzn2.0.1
运行在以下环境
系统 amazon_AMI openssl * Up to
(excluding)
1.0.2k-12.109.amzn1
运行在以下环境
系统 centos_7 java * Up to
(excluding)
1.0.2k-12.el7
运行在以下环境
系统 debian_10 openssl * Up to
(excluding)
1.1.0g-1
运行在以下环境
系统 debian_11 openssl * Up to
(excluding)
1.1.0g-1
运行在以下环境
系统 debian_12 openssl * Up to
(excluding)
1.1.0g-1
运行在以下环境
系统 fedora_25 openssl-libs * Up to
(excluding)
1.0.2m-1.fc25
运行在以下环境
系统 fedora_26 compat-openssl10-devel * Up to
(excluding)
1.1.0g-1.fc26
运行在以下环境
系统 fedora_27 compat-openssl10-debugsource * Up to
(excluding)
1.1.0g-1.fc27
运行在以下环境
系统 kylinos_aarch64_V10 openssl * Up to
(excluding)
1.0.2k-16.el7.ns7.01
运行在以下环境
系统 kylinos_x86_64_V10 openssl * Up to
(excluding)
1.0.2k-16.el7.ns7.01
运行在以下环境
系统 opensuse_Leap_42.2 nodejs4-docs * Up to
(excluding)
1.0.2j-13.1
运行在以下环境
系统 opensuse_Leap_42.3 nodejs6-devel * Up to
(excluding)
1.0.2j-13.1
运行在以下环境
系统 oracle_7 oraclelinux-release * Up to
(excluding)
1.0.2k-12.0.1.el7
运行在以下环境
系统 redhat_7 openssl * Up to
(excluding)
1.0.2k-12.el7
运行在以下环境
系统 suse_12 libopenssl-devel * Up to
(excluding)
1.0.2j-60.16
运行在以下环境
系统 suse_12_SP2 openssl * Up to
(excluding)
1.0.2j-60.16.1
运行在以下环境
系统 suse_12_SP3 java-1_8_0-ibm-alsa * Up to
(excluding)
1.0.2j-60.16.1
运行在以下环境
系统 ubuntu_14.04.6_lts openssl * Up to
(excluding)
1.0.1f-1ubuntu2.22
运行在以下环境
系统 ubuntu_16.04 openssl * Up to
(excluding)
1.0.2g-1ubuntu4.9
运行在以下环境
系统 ubuntu_16.04.7_lts openssl * Up to
(excluding)
1.0.2g-1ubuntu4.9
运行在以下环境
系统 ubuntu_18.04 openssl * Up to
(excluding)
1.0.2g-1ubuntu14
运行在以下环境
系统 ubuntu_18.04.5_lts openssl * Up to
(excluding)
1.0.2g-1ubuntu14
运行在以下环境
系统 ubuntu_18.10 openssl * Up to
(excluding)
1.0.2g-1ubuntu14
阿里云评分
2.7
  • 攻击路径
    远程
  • 攻击复杂度
    复杂
  • 权限要求
    普通权限
  • 影响范围
    有限影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    100
CWE-ID 漏洞类型
CWE-200 信息暴露
阿里云安全产品覆盖情况