CVE-2022-4304

CVE Details

Release Date:2023-02-07

Description


A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.

See more information about CVE-2022-4304 from MITRE CVE dictionary and NIST NVD


CVSS v3.0 metrics


NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.

Base Score: 5.9 Base Metrics: AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Access Vector: Network Attack Complexity: High
Privileges Required: None User Interaction: None
Scope: Unchanged Confidentiality Impact: None
Integrity Impact: High Availability Impact: None

Errata information


PlatformErrataRelease Date
Oracle Linux version 7 (edk2)ELSA-2023-130262023-12-06
Oracle Linux version 7 (edk2)ELSA-2023-130272023-12-07
Oracle Linux version 8 (edk2)ELSA-2023-130252023-12-06
Oracle Linux version 8 (edk2)ELSA-2023-29322023-05-24
Oracle Linux version 8 (edk2)ELSA-2023-327912023-12-06
Oracle Linux version 8 (openssl)ELSA-2023-122132023-03-28
Oracle Linux version 8 (openssl)ELSA-2023-14052023-03-22
Oracle Linux version 9 (edk2)ELSA-2023-130242023-12-06
Oracle Linux version 9 (edk2)ELSA-2023-21652023-05-15
Oracle Linux version 9 (edk2)ELSA-2023-327902023-12-07
Oracle Linux version 9 (openssl)ELSA-2023-09462023-02-28
Oracle Linux version 9 (openssl)ELSA-2023-121522023-03-01



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete