A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
m2crypto project m2crypto |
||
redhat enterprise linux 7.0 |
||
redhat enterprise linux 6.0 |
||
redhat virtualization 4.0 |
||
fedoraproject fedora 33 |
Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources More precise timing tests find many implementations vulnerable
An engineer has identified longstanding undetected flaws in a 25-year-old method for encrypting data using RSA public-key cryptography. In a paper titled, "Everlasting ROBOT: the Marvin Attack," Hubert Kario, senior quality engineer on the QE BaseOS Security team at Red Hat, shows that many software implementations of the PKCS#1 v1.5 padding scheme for RSA key exchange that were previously deemed immune to Daniel Bleichenbacher's widely known attack are, in fact, vulnerable. Back in 1998, Bleich...