Search for vulnerabilities
Vulnerability details: VCID-ys3w-wua9-aaas
Vulnerability ID VCID-ys3w-wua9-aaas
Aliases CVE-2017-3736
VC-OPENSSL-20171102-CVE-2017-3736
Summary There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-3736.html
rhas Moderate https://access.redhat.com/errata/RHSA-2018:0998
rhas Moderate https://access.redhat.com/errata/RHSA-2018:2185
rhas Moderate https://access.redhat.com/errata/RHSA-2018:2186
rhas Moderate https://access.redhat.com/errata/RHSA-2018:2187
rhas Important https://access.redhat.com/errata/RHSA-2018:2568
ssvc Track https://access.redhat.com/errata/RHSA-2018:2568
rhas Important https://access.redhat.com/errata/RHSA-2018:2575
ssvc Track https://access.redhat.com/errata/RHSA-2018:2575
rhas Moderate https://access.redhat.com/errata/RHSA-2018:2713
ssvc Track https://access.redhat.com/errata/RHSA-2018:2713
cvssv3 5.9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3736.json
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00482 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00482 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00482 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.00482 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.02757 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.02757 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.02757 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.02757 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.02757 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.02757 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.0316 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.0316 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.05939 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.06765 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
epss 0.12181 https://api.first.org/data/v1/epss?cve=CVE-2017-3736
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1509169
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736
cvssv2 7.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 7.4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 4.0 https://nvd.nist.gov/vuln/detail/CVE-2017-3736
cvssv3 6.5 https://nvd.nist.gov/vuln/detail/CVE-2017-3736
archlinux Medium https://security.archlinux.org/AVG-477
archlinux Medium https://security.archlinux.org/AVG-478
generic_textual Medium https://ubuntu.com/security/notices/USN-3475-1
generic_textual Moderate https://www.openssl.org/news/secadv/20171102.txt
cvssv3.1 9.8 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
generic_textual LOW https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
cvssv3.1 9.8 https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
generic_textual CRITICAL https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
cvssv3.1 5.9 https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
generic_textual MODERATE https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
cvssv3.1 9.8 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
generic_textual CRITICAL http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
cvssv3.1 7.5 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
generic_textual HIGH http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
cvssv3.1 9.8 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
generic_textual CRITICAL http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
cvssv3.1 5.9 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
generic_textual MODERATE http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-3736.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3736.json
https://api.first.org/data/v1/epss?cve=CVE-2017-3736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/openssl/openssl/commit/38d600147331d36e74174ebbd4008b63188b321b
https://github.com/openssl/openssl/commit/4443cf7aa0099e5ce615c18cee249fff77fb0871
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc
https://security.gentoo.org/glsa/201712-03
https://security.netapp.com/advisory/ntap-20171107-0002/
https://security.netapp.com/advisory/ntap-20180117-0002/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us
https://ubuntu.com/security/notices/USN-3475-1
https://www.debian.org/security/2017/dsa-4017
https://www.debian.org/security/2017/dsa-4018
https://www.openssl.org/news/secadv/20171102.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2017-14
https://www.tenable.com/security/tns-2017-15
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/101666
http://www.securitytracker.com/id/1039727
1509169 https://bugzilla.redhat.com/show_bug.cgi?id=1509169
ASA-201711-14 https://security.archlinux.org/ASA-201711-14
ASA-201711-15 https://security.archlinux.org/ASA-201711-15
AVG-477 https://security.archlinux.org/AVG-477
AVG-478 https://security.archlinux.org/AVG-478
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
CVE-2017-3736 https://nvd.nist.gov/vuln/detail/CVE-2017-3736
RHSA-2018:0998 https://access.redhat.com/errata/RHSA-2018:0998
RHSA-2018:2185 https://access.redhat.com/errata/RHSA-2018:2185
RHSA-2018:2186 https://access.redhat.com/errata/RHSA-2018:2186
RHSA-2018:2187 https://access.redhat.com/errata/RHSA-2018:2187
RHSA-2018:2568 https://access.redhat.com/errata/RHSA-2018:2568
RHSA-2018:2575 https://access.redhat.com/errata/RHSA-2018:2575
RHSA-2018:2713 https://access.redhat.com/errata/RHSA-2018:2713
USN-3475-1 https://usn.ubuntu.com/3475-1/
No exploits are available.

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/ Found at https://access.redhat.com/errata/RHSA-2018:2568

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/ Found at https://access.redhat.com/errata/RHSA-2018:2575

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:52Z/ Found at https://access.redhat.com/errata/RHSA-2018:2713
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3736.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:H/Au:N/C:C/I:C/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2017-3736
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2017-3736
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.54876
EPSS Score 0.00172
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.