{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2011-05-17T00:00:00.000Z","descriptions":[{"lang":"en","value":"The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2011-09-07T09:00:00.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"MDVSA-2011:136","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:136"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.kb.cert.org/vuls/id/MAPG-8FENZ3"},{"name":"MDVSA-2011:137","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:137"},{"name":"DSA-2309","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2011/dsa-2309"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.apple.com/kb/HT5784"},{"name":"APPLE-SA-2013-06-04-1","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"},{"name":"openSUSE-SU-2011:0634","tags":["vendor-advisory","x_refsource_SUSE"],"url":"https://hermes.opensuse.org/messages/8760466"},{"name":"VU#536044","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/536044"},{"name":"SUSE-SU-2011:0636","tags":["vendor-advisory","x_refsource_SUSE"],"url":"https://hermes.opensuse.org/messages/8764170"},{"name":"44935","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/44935"},{"tags":["x_refsource_MISC"],"url":"http://eprint.iacr.org/2011/232.pdf"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T22:46:00.682Z"},"title":"CVE Program Container","references":[{"name":"MDVSA-2011:136","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:136"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/MAPG-8FENZ3"},{"name":"MDVSA-2011:137","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:137"},{"name":"DSA-2309","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2011/dsa-2309"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.apple.com/kb/HT5784"},{"name":"APPLE-SA-2013-06-04-1","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"},{"name":"openSUSE-SU-2011:0634","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"https://hermes.opensuse.org/messages/8760466"},{"name":"VU#536044","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/536044"},{"name":"SUSE-SU-2011:0636","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"https://hermes.opensuse.org/messages/8764170"},{"name":"44935","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/44935"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://eprint.iacr.org/2011/232.pdf"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2011-1945","datePublished":"2011-05-31T20:00:00.000Z","dateReserved":"2011-05-09T00:00:00.000Z","dateUpdated":"2024-08-06T22:46:00.682Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}