Количество 9
Количество 9
GHSA-974v-c5m7-m9wc
A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
CVE-2024-2467
A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
CVE-2024-2467
A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
CVE-2024-2467
A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
CVE-2024-2467
A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA ...
SUSE-SU-2025:01887-1
Security update for perl-Crypt-OpenSSL-RSA
SUSE-SU-2025:01884-1
Security update for perl-Crypt-OpenSSL-RSA
BDU:2024-05718
Уязвимость пакета perl-Crypt-OpenSSL-RSA операционных систем Red Hat Enterprise Linux, позволяющая нарушителю реализовать атаку Блейхенбахера (Bleichenbacher)
ROS-20251215-7306
Уязвимость perl-Crypt-OpenSSL-RSA
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-974v-c5m7-m9wc A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode. | CVSS3: 5.9 | 0% Низкий | больше 1 года назад | |
CVE-2024-2467 A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode. | CVSS3: 5.9 | 0% Низкий | больше 1 года назад | |
CVE-2024-2467 A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode. | CVSS3: 5.9 | 0% Низкий | почти 2 года назад | |
CVE-2024-2467 A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode. | CVSS3: 5.9 | 0% Низкий | больше 1 года назад | |
CVE-2024-2467 A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA ... | CVSS3: 5.9 | 0% Низкий | больше 1 года назад | |
SUSE-SU-2025:01887-1 Security update for perl-Crypt-OpenSSL-RSA | 0% Низкий | 7 месяцев назад | ||
SUSE-SU-2025:01884-1 Security update for perl-Crypt-OpenSSL-RSA | 0% Низкий | 7 месяцев назад | ||
BDU:2024-05718 Уязвимость пакета perl-Crypt-OpenSSL-RSA операционных систем Red Hat Enterprise Linux, позволяющая нарушителю реализовать атаку Блейхенбахера (Bleichenbacher) | CVSS3: 5.9 | 0% Низкий | почти 2 года назад | |
ROS-20251215-7306 Уязвимость perl-Crypt-OpenSSL-RSA | CVSS3: 5.9 | 0% Низкий | около 1 месяца назад |
Уязвимостей на страницу