[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

openssl: Timing Oracle in RSA Decryption

Deprecated
ID: oval:org.secpod.oval:def:87669Date: (C)2023-02-21   (M)2024-02-08
Class: VULNERABILITYFamily: unix




A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP, and RSASVE.

Platform:
CentOS 7
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 8
Red Hat Enterprise Linux 9
Product:
openssl
Reference:
CVE-2022-4304
CVE    1
CVE-2022-4304
CPE    5
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/a:openssl:openssl
cpe:/o:centos:centos:7
...

© SecPod Technologies