Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-46392

Опубликовано: 15 дек. 2022
Источник: debian

Описание

An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mbedtlsfixed2.28.2-1package
mbedtlspostponedbusterpackage

Примечания

  • https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2

  • Issue is most likely related to library/bignum.c and the mbedtls_mpi_exp_mod function.

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 3 лет назад

An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.

CVSS3: 5.3
nvd
больше 3 лет назад

An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.

CVSS3: 5.3
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 5.3
github
больше 3 лет назад

An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.