Hello,

Our server does not consume any certificate from the client.
Client authentication or client certificate verification is disabled.
Server always has a valid ECC certificate.

BN_mod_sqrt() is not used anywhere in the server except by openssl.

If we consider ECDHE_ECDSA cipher based TLS handshake, then it is possible
that the client can send invalid public session key to the server causing
the vulnerability. Is this assumption correct ?

If yes, then I think disabling ECC cipher suites should prevent the
vulnerability if we don't want to upgrade openssl considering there is no
other cryptographic operation except w.r.t. TLS.

Regards,
Vipul

Reply via email to