Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-50781

Опубликовано: 05 фев. 2024
Источник: debian
EPSS Низкий

Описание

A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
m2cryptofixed0.40.1-3package
m2cryptopostponedbookwormpackage
m2cryptono-dsabullseyepackage
m2cryptono-dsabusterpackage

Примечания

  • https://todo.sr.ht/~mcepl/m2crypto/342

  • https://people.redhat.com/~hkario/marvin/

  • https://github.com/openssl/openssl/pull/13817

  • CVE is for incomplete fix of CVE-2020-25657

  • openssl 3.2 landed in Debian unstable at 04 Apr 2024, marking the first upload

  • of m2crypto following it as the fixed version (0.40.1-3)

EPSS

Процентиль: 53%
0.00306
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

CVSS3: 7.5
redhat
больше 1 года назад

A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

CVSS3: 7.5
nvd
больше 1 года назад

A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

CVSS3: 7.5
redos
около 1 года назад

Уязвимость python3-m2crypto

CVSS3: 5.9
github
больше 1 года назад

m2crypto Bleichenbacher timing attack - incomplete fix for CVE-2020-25657

EPSS

Процентиль: 53%
0.00306
Низкий