Логотип exploitDog
bind:"CVE-2023-0361"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-0361"

Количество 15

Количество 15

ubuntu логотип

CVE-2023-0361

почти 3 года назад

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
EPSS: Низкий
redhat логотип

CVE-2023-0361

почти 3 года назад

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2023-0361

почти 3 года назад

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
EPSS: Низкий
msrc логотип

CVE-2023-0361

почти 3 года назад

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2023-0361

почти 3 года назад

A timing side-channel in the handling of RSA ClientKeyExchange message ...

CVSS3: 7.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0610-1

больше 2 лет назад

Security update for gnutls

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0475-1

почти 3 года назад

Security update for gnutls

EPSS: Низкий
rocky логотип

RLSA-2023:1569

больше 2 лет назад

Moderate: gnutls security and bug fix update

EPSS: Низкий
rocky логотип

RLSA-2023:1141

больше 2 лет назад

Moderate: gnutls security and bug fix update

EPSS: Низкий
github логотип

GHSA-5547-g9w2-52xj

почти 3 года назад

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2023-1569

больше 2 лет назад

ELSA-2023-1569: gnutls security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-1141

больше 2 лет назад

ELSA-2023-1141: gnutls security and bug fix update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2023-07001

почти 3 года назад

Уязвимость криптографической библиотеки транспортного уровня GnuTLS, связанная с различием времени ответа при обработке шифротекста RSA в сообщении ClientKeyExchange с корректным и некорректным добавочным заполнением PKCS#1, позволяющая нарушителю восстановить ключ для расшифровки сообщений

CVSS3: 7.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4952-1

почти 2 года назад

Security update for gnutls

EPSS: Низкий
redos логотип

ROS-20240404-08

больше 1 года назад

Уязвимость gnutls

CVSS3: 7.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-0361

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
2%
Низкий
почти 3 года назад
redhat логотип
CVE-2023-0361

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
2%
Низкий
почти 3 года назад
nvd логотип
CVE-2023-0361

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
2%
Низкий
почти 3 года назад
msrc логотип
CVE-2023-0361

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
2%
Низкий
почти 3 года назад
debian логотип
CVE-2023-0361

A timing side-channel in the handling of RSA ClientKeyExchange message ...

CVSS3: 7.4
2%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0610-1

Security update for gnutls

2%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0475-1

Security update for gnutls

2%
Низкий
почти 3 года назад
rocky логотип
RLSA-2023:1569

Moderate: gnutls security and bug fix update

2%
Низкий
больше 2 лет назад
rocky логотип
RLSA-2023:1141

Moderate: gnutls security and bug fix update

2%
Низкий
больше 2 лет назад
github логотип
GHSA-5547-g9w2-52xj

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.5
2%
Низкий
почти 3 года назад
oracle-oval логотип
ELSA-2023-1569

ELSA-2023-1569: gnutls security and bug fix update (MODERATE)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-1141

ELSA-2023-1141: gnutls security and bug fix update (MODERATE)

больше 2 лет назад
fstec логотип
BDU:2023-07001

Уязвимость криптографической библиотеки транспортного уровня GnuTLS, связанная с различием времени ответа при обработке шифротекста RSA в сообщении ClientKeyExchange с корректным и некорректным добавочным заполнением PKCS#1, позволяющая нарушителю восстановить ключ для расшифровки сообщений

CVSS3: 7.4
2%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:4952-1

Security update for gnutls

почти 2 года назад
redos логотип
ROS-20240404-08

Уязвимость gnutls

CVSS3: 7.4
2%
Низкий
больше 1 года назад

Уязвимостей на страницу