跳转到帖子

Red Hat JBossEAP: Observable Discrepancy (CVE-2024-30171)

recommended_posts

发布于
  • Members

Red Hat JBossEAP: Observable Discrepancy (CVE-2024-30171)

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:C/I:N/A:N)
Published
04/18/2024
Created
09/20/2024
Added
09/19/2024
Modified
12/20/2024

Description

An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.. A flaw was found in the Bouncy Castle Java cryptography APIs. Affected versions of the org.bouncycastle:bcprov-jdk18on package are vulnerable to Observable Timing Discrepancy via the PKCS#1 1.5 and OAEP decryption process (a.k.a. Marvin Attack). An attacker can recover cipher-texts via a side-channel attack by exploiting the Marvin security flaw. The PKCS#1 1.5 attack vector leaks data via javax.crypto.Cipher exceptions and the OAEP interface vector leaks via the bit size of the decrypted data.

Solution(s)

  • red-hat-jboss-eap-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2024-30171
  • CVE - 2024-30171
  • https://access.redhat.com/security/cve/CVE-2024-30171
  • https://bugzilla.redhat.com/show_bug.cgi?id=2276360
  • https://people.redhat.com/~hkario/marvin/
  • https://access.redhat.com/errata/RHSA-2024:5143
  • https://access.redhat.com/errata/RHSA-2024:5144
  • https://access.redhat.com/errata/RHSA-2024:5145
  • https://access.redhat.com/errata/RHSA-2024:5147
  • https://access.redhat.com/errata/RHSA-2024:5479
  • https://access.redhat.com/errata/RHSA-2024:5481
  • https://access.redhat.com/errata/RHSA-2024:5482
View more
  • 查看数 696
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…