Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-24116

Опубликовано: 14 июл. 2021
Источник: debian
EPSS Низкий

Описание

In wolfSSL through 4.6.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wolfsslfixed4.6.0-1package

Примечания

  • https://github.com/wolfSSL/wolfssl/releases/tag/v4.8.0-stable

EPSS

Процентиль: 59%
0.00378
Низкий

Связанные уязвимости

CVSS3: 4.9
ubuntu
больше 4 лет назад

In wolfSSL through 4.6.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.

CVSS3: 4.9
nvd
больше 4 лет назад

In wolfSSL through 4.6.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.

github
больше 3 лет назад

In wolfSSL through 4.6.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.

CVSS3: 4.9
fstec
больше 4 лет назад

Уязвимость библиотеки SSL/TLS WolfSSL, связанная с раскрытием информации через несоответствие, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 59%
0.00378
Низкий