First published: Wed Nov 18 2015(Updated: )
It was found that `Zend\Crypt\PublicKey\Rsa\PublicKey` has a call to `openssl_public_encrypt()`, which uses PHP's default `$padding` argument, which specifies `OPENSSL_PKCS1_PADDING`, indicating usage of PKCS1v1.5 padding. This padding has a known vulnerability, the Bleichenbacher's chosen-ciphertext attack, that can be used to recover an RSA private key.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/zendframework/zend-crypt | >=2.0.0<2.4.9>=2.5.0<2.5.2 | |
composer/zendframework/zendframework | >=2.0.0<2.4.9 | |
composer/zendframework/zendframework | >=2.0.0<2.4.9 | 2.4.9 |
composer/zendframework/zend-crypt | >=2.5.0<2.5.2 | 2.5.2 |
composer/zendframework/zend-crypt | >=2.0.0<2.4.9 | 2.4.9 |
composer/zendframework/zendframework | >=2.5.0<2.5.2 | 2.5.2 |
Zend Framework | =2.4.0 | |
Zend Framework | =2.4.1 | |
Zend Framework | =2.4.2 | |
Zend Framework | =2.4.3 | |
Zend Framework | =2.4.4 | |
Zend Framework | =2.4.5 | |
Zend Framework | =2.4.6 | |
Zend Framework | =2.4.7 | |
Zend Framework | =2.4.8 | |
Zend Framework | =2.5.0 | |
Zend Framework | =2.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7503 is considered a moderate security vulnerability due to the potential for Bleichenbacher's chosen-ciphertext attack.
To remediate CVE-2015-7503, update zend-crypt to version 2.4.9 or later, or zendframework to version 2.5.2 or later.
CVE-2015-7503 affects zend-crypt versions from 2.0.0 to 2.4.9 and zendframework versions from 2.0.0 to 2.4.9.
CVE-2015-7503 involves the `Zend\Crypt\PublicKey\Rsa\PublicKey` and the use of the openssl_public_encrypt function.
Yes, CVE-2015-7503 highlights a known issue with PHP's default padding mechanism in cryptographic operations.