First published: Fri Mar 15 2024(Updated: )
A timing-based side-channel flaw exists in the rust-openssl package, which could be sufficient to recover a plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rust-openssl |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3296 is classified as a medium severity vulnerability due to its potential impact in enabling plaintext recovery across a network.
CVE-2024-3296 affects the rust-openssl package by introducing a timing-based side-channel flaw that could be exploited in specific attack scenarios.
CVE-2024-3296 facilitates a Bleichenbacher-style attack that allows attackers to potentially recover plaintext messages.
To fix CVE-2024-3296, update your rust-openssl package to the latest version that addresses this vulnerability.
Exploiting CVE-2024-3296 requires an attacker to send a large number of trial messages to successfully perform decryption.