[RUSTSEC-2023-0007] Timing Oracle in RSA Decryption
A timing based side channel exists in the OpenSSL RSA Decryption implementation
which could be sufficient to recover a plaintext across a network in a
Bleichenbacher style attack. To achieve a successful decryption an attacker
would have to be able to send a very large number of trial messages for
decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,
RSA-OEAP and RSASVE.
For example, in a TLS connection, RSA is commonly used by a client to send an
encrypted pre-master secret to the server. An attacker that had observed a
genuine connection between a client and a server could use this flaw to send
trial messages to the server and record the time taken to process them. After a
sufficiently large number of messages the attacker could recover the pre-master
secret used for the original connection and thus be able to decrypt the
application data sent over that connection.
Package | Affected Version |
---|---|
pkg:cargo/openssl-src | < 300.0.12 |
Package | Fixed Version |
---|---|
pkg:cargo/openssl-src | >= 111.25, < 300.0 |
pkg:cargo/openssl-src | >= 300.0.12 |
- ID
- RUSTSEC-2023-0007
- Severity
- medium
- Severity from
- CVE-2022-4304
- Impact
- Crypto Failure
- URL
- https://rustsec.org/advisories/RUSTSEC-2023-0007.html
- Published
-
2023-02-07T00:00:00
(19 months ago) - Modified
-
2023-06-13T13:10:24
(15 months ago) - Other Advisories
-
- ALAS-2023-1683
- ALAS2-2023-1934
- ALAS2-2023-1935
- ALAS2-2024-2502
- ALPINE:CVE-2022-4304
- ALSA-2023:0946
- ALSA-2023:1405
- ALSA-2023:2165
- ALSA-2023:2932
- DSA-5343-1
- ELSA-2023-0946
- ELSA-2023-12152
- ELSA-2023-12213
- ELSA-2023-13024
- ELSA-2023-13025
- ELSA-2023-13026
- ELSA-2023-13027
- ELSA-2023-1405
- ELSA-2023-2165
- ELSA-2023-2932
- ELSA-2023-32790
- ELSA-2023-32791
- FEDORA-2023-57f33242bc
- FEDORA-2023-a5564c0a3f
- FEDORA-2023-e1ffb79ddf
- FEDORA-2023-e821b64a4c
- FREEBSD:648A432C-A71F-11ED-86E9-D4C9EF517024
- FREEBSD:C8EB4C40-47BD-11EE-8E38-002590C1F29C
- GLSA-202402-08
- RHSA-2023:0946
- RHSA-2023:1405
- RHSA-2023:2165
- RHSA-2023:2932
- RLSA-2023:0946
- RLSA-2023:1405
- SSA:2023-038-01
- SUSE-SU-2023:0305-1
- SUSE-SU-2023:0305-2
- SUSE-SU-2023:0306-1
- SUSE-SU-2023:0307-1
- SUSE-SU-2023:0308-1
- SUSE-SU-2023:0309-1
- SUSE-SU-2023:0310-1
- SUSE-SU-2023:0311-1
- SUSE-SU-2023:0312-1
- SUSE-SU-2023:0581-1
- SUSE-SU-2023:0584-1
- SUSE-SU-2023:0684-1
- SUSE-SU-2023:2622-1
- SUSE-SU-2023:2623-1
- SUSE-SU-2023:2624-1
- SUSE-SU-2023:2633-1
- SUSE-SU-2023:2634-1
- SUSE-SU-2023:2648-1
- SUSE-SU-2023:3096-1
- SUSE-SU-2023:3179-1
- USN-5844-1
- USN-6564-1
Source | # ID | Name | URL |
---|---|---|---|
https://www.openssl.org/news/secadv/20230207.txt | |||
crates.io | openssl-src | https://crates.io/crates/openssl-src | |
rustsec.org | openssl-src | https://rustsec.org/packages/openssl-src.html | |
Security Advisory | GHSA-p52g-cm5j-mjv4 | https://github.com/advisories/GHSA-p52g-cm5j-mjv4 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Fixed | pkg:cargo/openssl-src | openssl-src | >= 111.25 < 300.0 | ||||
Fixed | pkg:cargo/openssl-src | openssl-src | >= 300.0.12 | ||||
Affected | pkg:cargo/openssl-src | openssl-src | < 300.0.12 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |