Логотип exploitDog
bind: "CVE-2023-0361"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-0361"

Количество 15

Количество 15

ubuntu логотип

CVE-2023-0361

около 3 лет назад

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
EPSS: Низкий
redhat логотип

CVE-2023-0361

около 3 лет назад

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2023-0361

около 3 лет назад

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
EPSS: Низкий
msrc логотип

CVE-2023-0361

около 3 лет назад

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2023-0361

около 3 лет назад

A timing side-channel in the handling of RSA ClientKeyExchange message ...

CVSS3: 7.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0610-1

около 3 лет назад

Security update for gnutls

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0475-1

около 3 лет назад

Security update for gnutls

EPSS: Низкий
rocky логотип

RLSA-2023:1569

почти 3 года назад

Moderate: gnutls security and bug fix update

EPSS: Низкий
rocky логотип

RLSA-2023:1141

около 3 лет назад

Moderate: gnutls security and bug fix update

EPSS: Низкий
github логотип

GHSA-5547-g9w2-52xj

около 3 лет назад

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2023-1569

почти 3 года назад

ELSA-2023-1569: gnutls security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-1141

около 3 лет назад

ELSA-2023-1141: gnutls security and bug fix update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2023-07001

около 3 лет назад

Уязвимость криптографической библиотеки транспортного уровня GnuTLS, связанная с различием времени ответа при обработке шифротекста RSA в сообщении ClientKeyExchange с корректным и некорректным добавочным заполнением PKCS#1, позволяющая нарушителю восстановить ключ для расшифровки сообщений

CVSS3: 7.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4952-1

больше 2 лет назад

Security update for gnutls

EPSS: Низкий
redos логотип

ROS-20240404-08

почти 2 года назад

Уязвимость gnutls

CVSS3: 7.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-0361

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
4%
Низкий
около 3 лет назад
redhat логотип
CVE-2023-0361

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
4%
Низкий
около 3 лет назад
nvd логотип
CVE-2023-0361

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
4%
Низкий
около 3 лет назад
msrc логотип
CVE-2023-0361

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.4
4%
Низкий
около 3 лет назад
debian логотип
CVE-2023-0361

A timing side-channel in the handling of RSA ClientKeyExchange message ...

CVSS3: 7.4
4%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:0610-1

Security update for gnutls

4%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:0475-1

Security update for gnutls

4%
Низкий
около 3 лет назад
rocky логотип
RLSA-2023:1569

Moderate: gnutls security and bug fix update

4%
Низкий
почти 3 года назад
rocky логотип
RLSA-2023:1141

Moderate: gnutls security and bug fix update

4%
Низкий
около 3 лет назад
github логотип
GHSA-5547-g9w2-52xj

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS3: 7.5
4%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2023-1569

ELSA-2023-1569: gnutls security and bug fix update (MODERATE)

почти 3 года назад
oracle-oval логотип
ELSA-2023-1141

ELSA-2023-1141: gnutls security and bug fix update (MODERATE)

около 3 лет назад
fstec логотип
BDU:2023-07001

Уязвимость криптографической библиотеки транспортного уровня GnuTLS, связанная с различием времени ответа при обработке шифротекста RSA в сообщении ClientKeyExchange с корректным и некорректным добавочным заполнением PKCS#1, позволяющая нарушителю восстановить ключ для расшифровки сообщений

CVSS3: 7.4
4%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:4952-1

Security update for gnutls

больше 2 лет назад
redos логотип
ROS-20240404-08

Уязвимость gnutls

CVSS3: 7.4
4%
Низкий
почти 2 года назад

Уязвимостей на страницу