Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
Products
perl-Crypt-OpenSSL-RSA
Source
secalert@redhat.com
Tags
CVE-2024-2467 details
Published : April 25, 2024, 5:15 p.m.
Last Modified : April 25, 2024, 5:24 p.m.
Last Modified : April 25, 2024, 5:24 p.m.
Description
A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
CVSS Score
1 | 2 | 3 | 4 | 5.9 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
Base Score
5.9
Exploitability Score
Impact Score
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
References
URL | Source |
---|---|
https://access.redhat.com/security/cve/CVE-2024-2467 | secalert@redhat.com |
https://bugzilla.redhat.com/show_bug.cgi?id=2269567 | secalert@redhat.com |
https://github.com/toddr/Crypt-OpenSSL-RSA/issues/42 | secalert@redhat.com |
https://people.redhat.com/~hkario/marvin/ | secalert@redhat.com |
This website uses the NVD API, but is not approved or certified by it.