Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-23170

Опубликовано: 31 янв. 2024
Источник: debian
EPSS Низкий

Описание

An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mbedtlsfixed2.28.7-1package
mbedtlsno-dsabookwormpackage
mbedtlsno-dsabullseyepackage
mbedtlsno-dsabusterpackage

Примечания

  • https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/

EPSS

Процентиль: 39%
0.00175
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 2 лет назад

An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

CVSS3: 5.5
nvd
около 2 лет назад

An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

CVSS3: 5.5
msrc
около 1 года назад

Описание отсутствует

suse-cvrf
около 2 лет назад

Security update for mbedtls

CVSS3: 5.5
github
около 2 лет назад

An issue was discovered in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2. There was a timing side channel in RSA private operations. This side channel could be sufficient for a local attacker to recover the plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

EPSS

Процентиль: 39%
0.00175
Низкий