CVE-2022-4304
Public on 2023-02-08
Modified on 2024-05-17
Description
A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP, and RSASVE.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 2 - Core | edk2 | 2024-03-13 | ALAS2-2024-2502 | Fixed |
Amazon Linux 1 | openssl | 2023-02-03 | ALAS-2023-1683 | Fixed |
Amazon Linux 2 - Core | openssl | 2023-02-03 | ALAS2-2023-1935 | Fixed |
Amazon Linux 2023 | openssl | 2023-02-17 | ALAS2023-2023-101 | Fixed |
Amazon Linux 2 - Openssl-snapsafe Extra | openssl-snapsafe | 2023-07-17 | ALAS2OPENSSL-SNAPSAFE-2023-002 | Fixed |
Amazon Linux 2 - Core | openssl11 | 2023-02-03 | ALAS2-2023-1934 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.4 | AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
NVD | CVSSv3 | 5.9 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |