• 公告ID (KylinSec-SA-2024-2571)

摘要:

iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

安全等级: Low

公告ID: KylinSec-SA-2024-2571

发布日期: 2024年6月4日

关联CVE: CVE-2024-26306  

  • 详细介绍

1. 漏洞描述

   

iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-26306 KY3.4-5 openssl Unaffected
CVE-2024-26306 KY3.5.2 openssl Unaffected
CVE-2024-26306 V6 openssl Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-2570 下一篇:KylinSec-SA-2024-2572