RSA BSAFE Crypto-J versions prior to 6.2.4 and RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during PKCS #1 unpadding operations, also known as a Bleichenbacher attack. A remote attacker may be able to recover a RSA key.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1041614 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1041615 | Third Party Advisory VDB Entry |
https://seclists.org/fulldisclosure/2018/Sep/7 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Dec 2021, 18:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:dell:rsa_bsafe_ssl-j:*:*:*:*:*:*:*:* |
30 Nov 2021, 18:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:dell:bsafe_crypto-j:*:*:*:*:*:*:*:* |
Information
Published : 2018-09-11 19:29
Updated : 2023-12-10 12:44
NVD link : CVE-2018-11070
Mitre link : CVE-2018-11070
CVE.ORG link : CVE-2018-11070
JSON object : View
Products Affected
dell
- rsa_bsafe_ssl-j
- bsafe_crypto-j
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm