QID 352487

Date Published: 2021-07-21

QID 352487: Amazon Linux Security Advisory for openssl: ALAS2-2021-1687

An integer overflow was found in the x64_64 montgomery squaring procedure used in exponentiation with 512-bit moduli.
As per upstream: * no ec algorithms are affected.
* attacks against 2-prime rsa1024, 3-prime rsa1536, and dsa1024 as a result of this defect would be very difficult to perform and are not believed likely.
* attacks against dh512 are considered just feasible.
However, for an attack the target would have to re-use the dh512 private key, which is not recommended anyway. * also applications directly using the low level api bn_mod_exp may be affected if they use bn_flg_consttime (cve-2019-1551)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.

  • CVSS V3 rated as Medium - 5.3 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2021-1687 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 352487

    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2021-1687 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2021-1687.html