Логотип exploitDog
bind:"CVE-2023-45287" OR bind:"CVE-2023-39326"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-45287" OR bind:"CVE-2023-39326"

Количество 35

Количество 35

oracle-oval логотип

ELSA-2024-2272

около 1 года назад

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2245

около 1 года назад

ELSA-2024-2245: buildah security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2193

около 1 года назад

ELSA-2024-2193: podman security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2023-45287

больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-45287

больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-45287

больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-2988

около 1 года назад

ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2023-39326

больше 1 года назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-39326

больше 1 года назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-39326

больше 1 года назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-39326

больше 1 года назад

A malicious HTTP sender can use chunk extensions to cause a receiver r ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-33qr-2xwr-95pw

больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-2239

около 1 года назад

ELSA-2024-2239: skopeo security update (MODERATE)

EPSS: Низкий
github логотип

GHSA-9f76-wg39-x86h

больше 1 года назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
EPSS: Низкий
oracle-oval логотип

ELSA-2024-12264

около 1 года назад

ELSA-2024-12264: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12263

около 1 года назад

ELSA-2024-12263: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12262

около 1 года назад

ELSA-2024-12262: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12261

около 1 года назад

ELSA-2024-12261: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12226

больше 1 года назад

ELSA-2024-12226: conmon security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12225

больше 1 года назад

ELSA-2024-12225: conmon security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2024-2272

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2024-2245

ELSA-2024-2245: buildah security update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2024-2193

ELSA-2024-2193: podman security update (MODERATE)

около 1 года назад
ubuntu логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...

CVSS3: 7.5
0%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-2988

ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

около 1 года назад
ubuntu логотип
CVE-2023-39326

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-39326

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-39326

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-39326

A malicious HTTP sender can use chunk extensions to cause a receiver r ...

CVSS3: 5.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-33qr-2xwr-95pw

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-2239

ELSA-2024-2239: skopeo security update (MODERATE)

около 1 года назад
github логотип
GHSA-9f76-wg39-x86h

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-12264

ELSA-2024-12264: olcne security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-12263

ELSA-2024-12263: olcne security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-12262

ELSA-2024-12262: olcne security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-12261

ELSA-2024-12261: olcne security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-12226

ELSA-2024-12226: conmon security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12225

ELSA-2024-12225: conmon security update (IMPORTANT)

больше 1 года назад

Уязвимостей на страницу