Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-2467
HistoryApr 25, 2024 - 12:00 a.m.

CVE-2024-2467

2024-04-2500:00:00
ubuntu.com
ubuntu.com
7
vulnerable
crypt-openssl-rsa
marvin attack
cve-2024-2467
upstream
libcrypt-openssl-rsa-perl
developers
unix

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.3%

A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA
package, which could be sufficient to recover plaintext across a network in
a Bleichenbacher-style attack. To achieve successful decryption, an
attacker would have to be able to send a large number of trial messages.
The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding
mode.

Bugs

Notes

Author Note
mdeslaur as of 2024-05-27, there is no fix available from the upstream libcrypt-openssl-rsa-perl developers

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.3%