Severity
3.7
Low severity
Details
- CVSS score
- 3.7
- CVSS vector
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Overview
About vulnerability
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).Details
- Affected product:
- AlmaLinux 8 , Alpine Linux 3.22 , CentOS 6 , CentOS 7 , CentOS 7 ELS , CentOS 8 , Debian 10 , Debian 10 ELS , Debian 11 , Debian 12 , Debian 13 , Debian 9 , EL 10 , EL 7 , EL 8 , EL 9 , Oracle Linux 8 , RHEL 6 , RHEL 7 , RHEL 8 , Ubuntu 16.04 , Ubuntu 16.04 ESM , Ubuntu 18.04 , Ubuntu 20.04 , Ubuntu 22.04 , Ubuntu 24.04
- Affected packages:
- openssl @ 1.1.1 (+29 more)