First published: Thu Mar 14 2024(Updated: )
A timing based side-channel exists in the perl-Crypt-OpenSSL-RSA package which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve successful decryption an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode. References: <a href="https://people.redhat.com/~hkario/marvin/">https://people.redhat.com/~hkario/marvin/</a> <a href="https://github.com/toddr/Crypt-OpenSSL-RSA/issues/42">https://github.com/toddr/Crypt-OpenSSL-RSA/issues/42</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Crypt-OpenSSL-RSA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2467 is classified as a critical vulnerability due to the potential for plaintext recovery through a timing-based side-channel attack.
To fix CVE-2024-2467, update the perl-Crypt-OpenSSL-RSA package to the latest version that mitigates this side-channel vulnerability.
CVE-2024-2467 affects users of the perl-Crypt-OpenSSL-RSA package, especially those handling sensitive data over a network.
CVE-2024-2467 enables a Bleichenbacher style attack, allowing attackers to recover plaintext through a series of trial messages.
Currently, the recommended action for CVE-2024-2467 is to apply available updates, as no specific workarounds are documented.