CVE-2020-25657

A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1889823 Issue Tracking Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:m2crypto_project:m2crypto:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

Information

Published : 2021-01-12 07:15

Updated : 2023-02-12 15:40


NVD link : CVE-2020-25657

Mitre link : CVE-2020-25657


JSON object : View

CWE
CWE-385

Covert Timing Channel

Advertisement

dedicated server usa

Products Affected

redhat

  • virtualization
  • enterprise_linux

m2crypto_project

  • m2crypto

fedoraproject

  • fedora