Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-0553

Опубликовано: 16 янв. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.

Отчет

The identified vulnerability in the GnuTLS library, designated as CVE-2024-0553, presents a moderate severity concern due to its potential for facilitating timing side-channel attacks in RSA-PSK ciphersuites. While the flaw allows for the exploitation of timing differentials during the key exchange process, enabling attackers to infer sensitive data, its impact is constrained by several factors. Firstly, successful exploitation requires precise timing measurements and sophisticated analysis techniques, posing a significant barrier to entry for potential attackers. Additionally, the effectiveness of the attack is contingent on environmental factors such as network latency and system load, further limiting its practical feasibility. This issue marked as an incomplete resolution for a previously identified vulnerability, CVE-2023-5981, indicating a potential persistence or recurrence of the problem.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6gnutlsOut of support scope
Red Hat Enterprise Linux 7gnutlsOut of support scope
Red Hat Enterprise Linux 8gnutlsFixedRHSA-2024:062731.01.2024
Red Hat Enterprise Linux 8gnutlsFixedRHSA-2024:062731.01.2024
Red Hat Enterprise Linux 8.6 Extended Update SupportgnutlsFixedRHSA-2024:110805.03.2024
Red Hat Enterprise Linux 8.8 Extended Update SupportgnutlsFixedRHSA-2024:079613.02.2024
Red Hat Enterprise Linux 9gnutlsFixedRHSA-2024:053329.01.2024
Red Hat Enterprise Linux 9gnutlsFixedRHSA-2024:053329.01.2024
Red Hat Enterprise Linux 9.2 Extended Update SupportgnutlsFixedRHSA-2024:108205.03.2024
RHODF-4.15-RHEL-9odf4/cephcsi-rhel9FixedRHSA-2024:138319.03.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1300->CWE-203
https://bugzilla.redhat.com/show_bug.cgi?id=2258412gnutls: incomplete fix for CVE-2023-5981

EPSS

Процентиль: 76%
0.01029
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.

CVSS3: 7.5
nvd
больше 1 года назад

A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.

CVSS3: 7.5
msrc
12 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
больше 1 года назад

A vulnerability was found in GnuTLS. The response times to malformed c ...

rocky
больше 1 года назад

Moderate: gnutls security update

EPSS

Процентиль: 76%
0.01029
Низкий

7.5 High

CVSS3

Уязвимость CVE-2024-0553