First published: Fri Oct 28 2016(Updated: )
In Botan 1.11.29 through 1.11.32, RSA decryption with certain padding options had a detectable timing channel which could given sufficient queries be used to recover plaintext, aka an "OAEP side channel" attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Botan Project Botan | =1.11.29 | |
Botan Project Botan | =1.11.30 | |
Botan Project Botan | =1.11.31 | |
Botan Project Botan | =1.11.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.