First published: Fri Mar 15 2024(Updated: )
Description: A timing based side-channel exists in the rust-openssl package which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve successful decryption an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode. References: <a href="https://people.redhat.com/~hkario/marvin/">https://people.redhat.com/~hkario/marvin/</a> <a href="https://github.com/sfackler/rust-openssl/issues/2171">https://github.com/sfackler/rust-openssl/issues/2171</a>
Affected Software | Affected Version | How to fix |
---|---|---|
rust-openssl |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2269723 is high due to the potential for a timing-based side-channel attack that could compromise plaintext data.
To fix REDHAT-BUG-2269723, you should update the rust-openssl package to the latest version that addresses this vulnerability.
The rust-openssl package is the primary affected software in relation to REDHAT-BUG-2269723.
REDHAT-BUG-2269723 allows an attacker to potentially perform a Bleichenbacher style attack to recover plaintext.
The nature of the vulnerability in REDHAT-BUG-2269723 is a timing-based side-channel that could enable decryption from multiple trial messages.