5.9

CVE-2024-2236

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://git.gnupg.org/libgcrypt.git
Package libgcrypt
Default Statusunaffected
Version < 9.4.0
Version 0
Status affected
VendorRed Hat
Product Red Hat Enterprise Linux 9
Default Statusaffected
Version < *
Version 0:1.10.0-11.el9
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 9
Default Statusaffected
Version < *
Version 0:1.10.0-11.el9
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 9.2 Extended Update Support
Default Statusaffected
Version < *
Version 0:1.10.0-10.el9_2.1
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 9.4 Extended Update Support
Default Statusaffected
Version < *
Version 0:1.10.0-10.el9_4.1
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 10
Default Statusunaffected
VendorRed Hat
Product Red Hat Enterprise Linux 6
Default Statusunknown
VendorRed Hat
Product Red Hat Enterprise Linux 7
Default Statusaffected
VendorRed Hat
Product Red Hat Enterprise Linux 8
Default Statusaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.22% 0.448
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secalert@redhat.com 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-208 Observable Timing Discrepancy

Two separate operations in a product require different amounts of time to complete, in a way that is observable to an actor and reveals security-relevant information about the state of the product, such as whether a particular operation was successful or not.