Описание
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. Note: An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
A flaw was found in NSS, where it is vulnerable to RSA key generation cache timing side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. The highest threat to this flaw is to confidentiality.
Отчет
A timing attack was found in the way NSS generated RSA keys. A man-in-the-middle attacker could use this attack during RSA key generation to recover the private key. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | nss | Out of support scope | ||
| Red Hat Enterprise Linux 6 | nss | Out of support scope | ||
| Red Hat OpenShift Container Platform 4 | nss-altfiles | Not affected | ||
| Red Hat Enterprise Linux 7 | nspr | Fixed | RHSA-2020:4076 | 29.09.2020 |
| Red Hat Enterprise Linux 7 | nss | Fixed | RHSA-2020:4076 | 29.09.2020 |
| Red Hat Enterprise Linux 7 | nss-softokn | Fixed | RHSA-2020:4076 | 29.09.2020 |
| Red Hat Enterprise Linux 7 | nss-util | Fixed | RHSA-2020:4076 | 29.09.2020 |
| Red Hat Enterprise Linux 8 | nspr | Fixed | RHSA-2020:3280 | 03.08.2020 |
| Red Hat Enterprise Linux 8 | nss | Fixed | RHSA-2020:3280 | 03.08.2020 |
| Red Hat OpenShift Do | openshiftdo/odo-init-image-rhel7 | Fixed | RHSA-2021:0949 | 22.03.2021 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.4 Medium
CVSS3
Связанные уязвимости
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
During RSA key generation, bignum implementations used a variation of ...
EPSS
4.4 Medium
CVSS3