Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-974v-c5m7-m9wc

Опубликовано: 25 апр. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 5.9

Описание

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.

EPSS

Процентиль: 21%
0.00068
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-203

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 1 года назад

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.

CVSS3: 5.9
redhat
почти 2 года назад

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.

CVSS3: 5.9
nvd
больше 1 года назад

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.

CVSS3: 5.9
debian
больше 1 года назад

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA ...

suse-cvrf
7 месяцев назад

Security update for perl-Crypt-OpenSSL-RSA

EPSS

Процентиль: 21%
0.00068
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-203