openssl: Timing Oracle in RSA DecryptionDeprecated |
ID: oval:org.secpod.oval:def:87669 | Date: (C)2023-02-21 (M)2024-02-08 |
Class: VULNERABILITY | Family: unix |
A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP, and RSASVE.
Platform: |
CentOS 7 |
Red Hat Enterprise Linux 7 |
Red Hat Enterprise Linux 8 |
Red Hat Enterprise Linux 9 |