A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat openssl
|
|
CPEs | cpe:2.3:a:redhat:openssl:-:*:*:*:*:*:*:* | |
Vendors & Products |
Redhat openssl
|
|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-04-25T16:45:02.948Z
Updated: 2024-09-18T15:58:16.449Z
Reserved: 2024-03-14T17:31:30.419Z
Link: CVE-2024-2467
Vulnrichment
Updated: 2024-08-01T19:11:53.605Z
NVD
Status : Awaiting Analysis
Published: 2024-04-25T17:15:49.580
Modified: 2024-11-21T09:09:49.040
Link: CVE-2024-2467
Redhat