GCVE-VVD-MAGEIA-2017-42
Advisory Published
Vulnetix · Advisory published July 28, 2017
There is a carry propagation bug in the Broadwell-specific Montgomery multiplication procedure that handles input lengths divisible by, but longer than 256 bits. mong EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation (CVE-2016-7055). If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. The crash can be triggered when using RC4-MD5, if it has not been disabled (CVE-2017-3731). There is a carry propagating bug in the x86_64 Montgomery squaring procedure. An attacker would need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients (CVE-2017-3732).

Affected Products

VendorProductVersionsPlatforms
Mageia0ad-data0 (affected), 0.0.22-1.mga6 (unaffected)
Mageiaopenssl0 (affected), 1.0.2k-1.mga5 (unaffected), 0 (affected), 1.0.2k-1.mga5 (unaffected)
Mageia0ad0 (affected), 0.0.22-1.1.mga6 (unaffected)

Aliases

Transitive aliases

References

Browse GCVE Records

100 records in the GCVE database · Updated April 16, 2026

No matching records found.

Explore Further

Investigate this vulnerability in the interactive console or download the raw GCVE record.