RSA BSAFE Crypto-J versions prior to 6.2.4 and RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during PKCS #1 unpadding operations, also known as a Bleichenbacher attack. A remote attacker may be able to recover a RSA key.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1041614 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1041615 | Third Party Advisory VDB Entry |
https://seclists.org/fulldisclosure/2018/Sep/7 | Mailing List Third Party Advisory |
http://www.securitytracker.com/id/1041614 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1041615 | Third Party Advisory VDB Entry |
https://seclists.org/fulldisclosure/2018/Sep/7 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securitytracker.com/id/1041614 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1041615 - Third Party Advisory, VDB Entry | |
References | () https://seclists.org/fulldisclosure/2018/Sep/7 - Mailing List, Third Party Advisory |
Information
Published : 2018-09-11 19:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-11070
Mitre link : CVE-2018-11070
CVE.ORG link : CVE-2018-11070
JSON object : View
Products Affected
dell
- rsa_bsafe_ssl-j
- bsafe_crypto-j
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm