Description
crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.
Remediation
References
Related Vulnerabilities
WordPress Plugin Ajax Search Pro Security Bypass (3.5)
WeBid Incorrect Comparison Vulnerability (CVE-2020-23359)
PostgreSQL Improper Control of Dynamically-Managed Code Resources Vulnerability (CVE-2022-2625)
WordPress Plugin WP Js External Link Info Cross-Site Scripting (1.21)
WordPress Plugin Contact Form 7-PayPal Add-on Cross-Site Request Forgery (1.3.4)