A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat openssl
|
|
CPEs | cpe:2.3:a:redhat:openssl:-:*:*:*:*:*:*:* | |
Vendors & Products |
Redhat openssl
|
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-03-15T01:00:34.421Z
Reserved: 2024-03-14T17:31:30.419Z
Link: CVE-2024-2467

Updated: 2024-08-01T19:11:53.605Z

Status : Awaiting Analysis
Published: 2024-04-25T17:15:49.580
Modified: 2024-11-21T09:09:49.040
Link: CVE-2024-2467
