製品・ソフトウェアに関する情報
OpenSSL における脆弱性
Title OpenSSL における脆弱性
Summary

OpenSSL には、1024-bit 係数を伴う累乗法で使用される AVX2 Montgomery 乗算手順にオーバーフローの問題があるため、不特定の影響を受ける脆弱性が存在します。 本脆弱性は、CVE-2017-3736、CVE-2017-3732 および CVE-2015-3193 と類似した問題です。

Possible impacts 不特定の影響を受ける可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Dec. 7, 2017, midnight
Registration Date Jan. 12, 2018, 11:24 a.m.
Last Update Aug. 13, 2018, 6:14 p.m.
CVSS3.0 : 警告
Score 5.9
Vector CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS2.0 : 警告
Score 4.3
Vector AV:N/AC:M/Au:N/C:P/I:N/A:N
Affected System
OpenSSL Project
OpenSSL 
日本電気
NEC エッジゲートウェイ すべてのバージョン
日立
Cosminexus HTTP Server 
Hitachi Automation Director (海外版)
Hitachi Automation Director (国内版)
Hitachi Compute Systems Manager 
Hitachi Configuration Manager 
Hitachi Device Manager 
Hitachi Global Link Manager 
Hitachi Infrastructure Analytics Advisor 
Hitachi Replication Manager 
Hitachi Tiered Storage Manager 
Hitachi Tuning Manager 
JP1/Automatic Job Management System 3 - Web Console (Windows, Linux)
JP1/Automatic Operation 
JP1/IT Desktop Management 2 - Smart Device Manager
JP1/Operations Analytics 
JP1/Performance Management - Web Console
JP1/SNMP System Observer 
uCosminexus Application Server 
uCosminexus Application Server -R
uCosminexus Developer 
uCosminexus Primary Server Base
uCosminexus Service Architect 
uCosminexus Service Platform 
Debian
Debian GNU/Linux 9.0
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
2 [2018年06月01日]
  影響を受けるシステム:ベンダ情報の追加に伴い内容を更新
  ベンダ情報:日本電気(NV18-010) を追加
June 1, 2018, 2:25 p.m.
3 [2018年08月13日]
  影響を受けるシステム:ベンダ情報の追加に伴い内容を更新
  ベンダ情報:日立 (hitachi-sec-2018-124) を追加
Aug. 13, 2018, 4:58 p.m.
1 [2018年03月29日]
  参考情報:JVN (JVNVU#93502675) を追加
March 29, 2018, 10:28 a.m.
4 [2019年02月05日]
  影響を受けるシステム:ベンダ情報の追加に伴い内容を更新
  ベンダ情報:日立 (hitachi-sec-2019-105) を追加
Feb. 5, 2019, 10:23 a.m.
0 [2018年01月12日]
  掲載
[2018年02月13日]
  影響を受けるシステム:ベンダ情報の追加に伴い内容を更新
  ベンダ情報:日立 (hitachi-sec-2018-106) を追加
Feb. 17, 2018, 10:37 a.m.
5 [2019年07月29日]
  影響を受けるシステム:内容を更新
July 29, 2019, 10:43 a.m.

NVD Vulnerability Information
CVE-2017-3738
Summary

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.

Publication Date Dec. 8, 2017, 1:29 a.m.
Registration Date Jan. 26, 2021, 1:23 p.m.
Last Update Nov. 21, 2024, 12:26 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:a:openssl:openssl:1.1.0e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.0f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.0d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.0g:*:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* 4.0.0 4.1.2
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* 6.0.0 6.8.1
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* 8.0.0 8.8.1
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* 9.0.0 9.2.1
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* 8.9.0 8.9.3
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* 6.9.0 6.12.2
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* 4.2.0 4.8.7
Related information, measures and tools
Common Vulnerabilities List