CVE-2005-1797
Published May 26, 2005
Last updated 16 years ago
Overview
- Description
- The design of Advanced Encryption Standard (AES), aka Rijndael, allows remote attackers to recover AES keys via timing attacks on S-box lookups, which are difficult to perform in constant time in AES implementations.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.1
- Impact score
- 6.4
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Vendor comments
- Red HatThe OpenSSL Team do not consider this issue to be a practical threat. Conducting an attack such as this has shown to be impractical outside of a controlled lab environment. If the OpenSSL Team decide to produce an update to correct this issue, we will consider including it in a future security update.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14D983EC-61B0-4FD9-89B5-9878E4CE4405" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5D7BE3C-8CA2-4FB2-B4AE-B201D88C2A9D" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC4C5F05-BC0B-478D-9A6F-7C804777BA41" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8847BD34-BDE6-4AE9-96D9-75B9CF93A6A8" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EDB5A09-BE86-4352-9799-A875649EDB7D" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F03FA9C0-24C7-46AC-92EC-7834BC34C79B" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5E4742C-A983-4F00-B24F-AB280C0E876D" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A0628DF-3A4C-4078-B615-22260671EABF" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "962FCB86-15AD-4399-8B7D-EC1DEA919C59" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "180D07AE-C571-4DD6-837C-43E2A946007A" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90789533-C741-4B1C-A24B-2C77B9E4DE5F" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1520065B-46D7-48A4-B9D0-5B49F690C5B4" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AA526B9-726A-49D5-B3CA-EBE2DA303CA0" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "494E48E7-EF86-4860-9A53-94F6C313746E" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2636B92E-47D5-42EA-9585-A2B84FBE71CB" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72FE2F46-2D0C-4C90-AFBE-D2E7B496D6E4" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45A518E8-21BE-4C5C-B425-410AB1208E9C" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E3AB748-E463-445C-ABAB-4FEDDFD1878B" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "660E4B8D-AABA-4520-BC4D-CF8E76E07C05" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85BFEED5-4941-41BB-93D1-CD5C2A41290E" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78E79A05-64F3-4397-952C-A5BB950C967D" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "549BB01D-F322-4FE3-BDA2-4FEA8ED8568A" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DE6CBD6-D6DD-4BC5-93F6-FDEA70163336" } ], "operator": "OR" } ] } ]