Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-26306

Опубликовано: 15 мая 2024
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

A timing-based side-channel flaw was found in iperf3. If the iperf3 server is running with the --rsa-private-key-path option, the user authentication API can be attacked.

Отчет

The timing-based side-channel flaw in iperf3's handling of the --rsa-private-key-path option represents a moderate severity issue due to its potential impact on the confidentiality and integrity of user authentication. While the vulnerability allows for the exploitation of timing discrepancies to potentially deduce information about the private key, it requires specific conditions to be met for successful exploitation. Additionally, the attack vector is limited to instances where the server is configured with the --rsa-private-key-path option and actively engaged in user authentication. While the risk is significant for servers using this configuration, the broader impact is mitigated by these constraints.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7iperf3Out of support scope
Red Hat Enterprise Linux 8iperf3FixedRHSA-2024:424102.07.2024
Red Hat Enterprise Linux 9iperf3FixedRHSA-2024:918512.11.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-203
https://bugzilla.redhat.com/show_bug.cgi?id=2270270iperf3: vulnerable to marvin attack if the authentication option is used

EPSS

Процентиль: 22%
0.0007
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 1 года назад

iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

CVSS3: 5.9
nvd
около 1 года назад

iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

CVSS3: 5.9
msrc
около 1 года назад

Описание отсутствует

CVSS3: 5.9
debian
около 1 года назад

iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server wi ...

suse-cvrf
около 1 года назад

Security update for iperf

EPSS

Процентиль: 22%
0.0007
Низкий

5.9 Medium

CVSS3