CVE-2024-2467

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
Configurations

No configuration.

History

21 Nov 2024, 09:09

Type Values Removed Values Added
Summary
  • (es) Existe una falla de canal lateral basada en the perl-Crypt-OpenSSL-RSA package, que podría ser suficiente para recuperar texto plano a través de una red en un ataque estilo Bleichenbacher. Para lograr un descifrado exitoso, un atacante tendría que poder enviar una gran cantidad de mensajes de prueba. La vulnerabilidad afecta al modo de relleno de cifrado RSA PKCS#1v1.5 heredado.
References () https://access.redhat.com/security/cve/CVE-2024-2467 - () https://access.redhat.com/security/cve/CVE-2024-2467 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=2269567 - () https://bugzilla.redhat.com/show_bug.cgi?id=2269567 -
References () https://github.com/toddr/Crypt-OpenSSL-RSA/issues/42 - () https://github.com/toddr/Crypt-OpenSSL-RSA/issues/42 -
References () https://people.redhat.com/~hkario/marvin/ - () https://people.redhat.com/~hkario/marvin/ -

25 Apr 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-25 17:15

Updated : 2024-11-21 09:09


NVD link : CVE-2024-2467

Mitre link : CVE-2024-2467

CVE.ORG link : CVE-2024-2467


JSON object : View

Products Affected

No product.

CWE
CWE-203

Observable Discrepancy