{"id":"CVE-2011-1945","details":"The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation.","modified":"2026-01-27T04:10:48.219558Z","published":"2011-05-31T20:55:05Z","withdrawn":"2026-01-27T04:10:48.219558Z","related":["SUSE-SU-2015:1184-1","SUSE-SU-403","SUSE-SU-403 Forbidden-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/44935"},{"type":"ADVISORY","url":"http://www.debian.org/security/2011/dsa-2309"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:136"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:137"},{"type":"EVIDENCE","url":"http://eprint.iacr.org/2011/232.pdf"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"},{"type":"WEB","url":"http://support.apple.com/kb/HT5784"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/536044"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/MAPG-8FENZ3"},{"type":"WEB","url":"https://hermes.opensuse.org/messages/8760466"},{"type":"WEB","url":"https://hermes.opensuse.org/messages/8764170"}],"schema_version":"1.7.3"}