CVE-2007-3108

Summary

CVECVE-2007-3108
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2007-08-08 01:17:00 UTC
Updated2018-10-16 16:47:00 UTC
DescriptionThe BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.

Risk And Classification

Problem Types: NVD-CWE-Other

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Openssl Openssl All All All All

References

ReferenceSourceLinkTags
VUPEN Security - Offensive Cyber Security VUPEN www.vupen.com
rPath update for openssl - Advisories - Secunia SECUNIA secunia.com
VMware ESXi OpenSSL Vulnerabilities - Advisories - Secunia SECUNIA secunia.com
USN-522-1: openssl vulnerabilities | Ubuntu security notices UBUNTU usn.ubuntu.com
rhn.redhat.com | Red Hat Support REDHAT www.redhat.com
VU#724968 - RSA key reconstruction vulnerability CERT-VN www.kb.cert.org US Government Resource
VMSA-2008-0001.1 - VMware CONFIRM www.vmware.com
VMware ESX Server Multiple Security Updates - Advisories - Secunia SECUNIA secunia.com
SecurityFocus BUGTRAQ www.securityfocus.com
Security Advisories | Mandriva Linux MANDRIVA www.mandriva.com
Debian -- Security Information -- DSA-1571-1 openssl DEBIAN www.debian.org
rPath update for openssl - Advisories - Secunia SECUNIA secunia.com
VMSA-2008-0013.3 - VMware CONFIRM www.vmware.com
Repository / Oval Repository OVAL oval.cisecurity.org
[Security-announce] VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages MLIST lists.vmware.com
issues.rpath.com/browse/RPL-1633 CONFIRM issues.rpath.com
Webmail - OVH VUPEN www.vupen.com
Webmail - OVH VUPEN www.vupen.com
Mandriva update for openssl - Advisories - Secunia SECUNIA secunia.com
ASA-2007-485 (RHSA-2007-0813) CONFIRM support.avaya.com
issues.rpath.com/browse/RPL-1613 CONFIRM issues.rpath.com
SecurityFocus BUGTRAQ www.securityfocus.com
OpenSSL RSA key reconstruction vulnerability (CVE-2007-3108, VU#724968) | Blue Coat Systems, Inc. CONFIRM www.bluecoat.com
Linux Terminal Server Project: Multiple vulnerabilities — Gentoo Linux Documentation GENTOO www.gentoo.org
support.attachmate.com/techdocs/2374.html CONFIRM support.attachmate.com
Webmail - OVH VUPEN www.vupen.com
Red Hat update for openssl - Advisories - Secunia SECUNIA secunia.com
Webmail - OVH VUPEN www.vupen.com
Blue Coat Products OpenSSL RSA Key Reconstruction Weakness - Advisories - Secunia SECUNIA secunia.com
VMware updates for OpenSSL, net-snmp, and perl - Secunia Advisories - Vulnerability Intelligence - Secunia.com SECUNIA secunia.com
/err404.html CONFIRM openssl.org
Webmail - OVH VUPEN www.vupen.com
rhn.redhat.com | Red Hat Support REDHAT www.redhat.com
Avaya Products OpenSSL Vulnerabilities - Advisories - Secunia SECUNIA secunia.com
OpenSSL: CVS Web Interface CONFIRM cvs.openssl.org
SecurityFocus BUGTRAQ www.securityfocus.com
Gentoo ltsp Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com SECUNIA secunia.com
Gentoo update for openssl - Advisories - Secunia SECUNIA secunia.com
Ubuntu update for openssl - Advisories - Secunia SECUNIA secunia.com
Reflection for Secure IT Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com SECUNIA secunia.com
Gentoo Linux Documentation -- OpenSSL: Multiple vulnerabilities GENTOO security.gentoo.org
Debian OpenSSL Predictable Random Number Generator and Update - Secunia Advisories - Vulnerability Information - Secunia.com SECUNIA secunia.com
OpenSSL Montgomery Exponentiation Side-Channel Local Information Disclosure Vulnerability BID www.securityfocus.com Patch
Red Hat update for openssl - Advisories - Secunia SECUNIA secunia.com
rhn.redhat.com | Red Hat Support REDHAT www.redhat.com
OpenSSL Information for VU#724968 CONFIRM www.kb.cert.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

OrganizationPublishedContributorStatement
Red Hat2007-08-14Mark J CoxThis paper describes a possible side-channel attack that hasn’t been proven outside of a lab environment. In reality many factors would make this harder to exploit. If exploited, a local user could obtain RSA private keys (for example for web sites being run on the server). We have rated this as affecting Red Hat products with moderate security severity. Although the OpenSSL team have produced a patch for this issue, it is non-trivial and will require more testing before we can deploy it in a future update. Our current plan is as follows: - To include a backported fix in an OpenSSL update as part of Enterprise Linux 4.6. This will get testing via beta and give time for more extensive internal and upstream testing - To release an update for OpenSSL for other platforms at the same time as 4.6 is released http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3108

Legacy QID Mappings

  • 390284 Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2023-0013)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report