


- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
Summary
A timing-based side channel exists in the OpenSSL RSA Decryption implementation that could be used to recover a plaintext across a network with a Bleichenbacher style attack. An attacker would have to send a lot of trial messages to get a successful decryption. All RSA padding modes are affected by the vulnerability. The attacker could recover the pre-master secret used for the original connection after a large number of messages.
Products Potentially Affected
|
Repair Recommendations
Fixed in 7.4.1h or later. (Target GA: September, 2023)
Please see the full security advisory article here for more details and updates.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.