Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-46809

Опубликовано: 16 фев. 2024
Источник: redhat
CVSS3: 5.9

Описание

Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.

A flaw was found in Node.js. The privateDecrypt() API of the crypto library may allow a covert timing side-channel during PKCS#1 v1.5 padding error handling. This issue revealed significant timing differences in decryption for valid and invalid ciphertexts, which may allow a remote attacker to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing JSON Web Encryption messages.

Отчет

This Node.js vulnerability poses a notable risk as it allows for covert timing side-channel attacks during RSA ciphertext decryption, potentially enabling attackers to decrypt captured data or forge signatures. It's classified as "Medium" severity rather than important due to its dependency on specific conditions for exploitation, such as the use of the privateDecrypt() API with PKCS#1 v1.5 padding.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8nodejs:16/nodejsWill not fix
Red Hat Enterprise Linux 9nodejsWill not fix
Red Hat Software Collectionsrh-nodejs14-nodejsWill not fix
Red Hat Enterprise Linux 8nodejsFixedRHSA-2024:151026.03.2024
Red Hat Enterprise Linux 8nodejsFixedRHSA-2024:168708.04.2024
Red Hat Enterprise Linux 8.8 Extended Update SupportnodejsFixedRHSA-2024:188018.04.2024
Red Hat Enterprise Linux 9nodejsFixedRHSA-2024:150325.03.2024
Red Hat Enterprise Linux 9nodejsFixedRHSA-2024:168808.04.2024
Red Hat Enterprise Linux 9.2 Extended Update SupportnodejsFixedRHSA-2024:193222.04.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-385->CWE-208
https://bugzilla.redhat.com/show_bug.cgi?id=2264569nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin)

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.4
ubuntu
9 месяцев назад

Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.

CVSS3: 7.4
nvd
9 месяцев назад

Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.

CVSS3: 7.4
debian
9 месяцев назад

Node.js versions which bundle an unpatched version of OpenSSL or run a ...

CVSS3: 7.4
github
9 месяцев назад

Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.

CVSS3: 5.9
fstec
больше 1 года назад

Уязвимость функции PrivateDecrypt() криптографической библиотеки программной платформы Node.js, позволяющая нарушителю реализовать атаку Блейхенбахера (Bleichenbacher) или атаку Марвина (Marvin)

5.9 Medium

CVSS3

Уязвимость CVE-2023-46809