Description
crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.
Remediation
References
Related Vulnerabilities
WordPress Plugin Resume Submissions & Job Postings Arbitrary File Upload (2.5.3)
Ruby Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4481)
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2019-10086)
Open Resty Uncontrolled Resource Consumption Vulnerability (CVE-2023-44487)