CPANSA-Crypt-OpenSSL-RSA-2024-2467: Crypt-OpenSSL-RSA vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2024-04-25T00:00:00 Engine CSAF Perl Toolkit 0.25
Current release date 2024-04-25T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score 5.9 Severity
Original language Language en
Also referred to

Vulnerability Description

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.

Vulnerabilities

CVE-2024-2467

Vulnerability Description

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.

Weakness CWE-203 : Observable Discrepancy

Product status

Known affected
Product Score
Crypt-OpenSSL-RSA less than 0.35
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N 5.9 Medium
Fixed

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Thu Apr 25 00:00:00 2024 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/