Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-4421
HistoryDec 12, 2023 - 12:00 a.m.

CVE-2023-4421

2023-12-1200:00:00
ubuntu.com
ubuntu.com
29
nss
bleichenbacher
timing side-channel
implicit rejection algorithm
marvin attack
cve-2023-4421
rsa
tls

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.1%

The NSS code used for checking PKCS#1 v1.5 was leaking information useful
in mounting Bleichenbacher-like attacks. Both the overall correctness of
the padding as well as the length of the encrypted message was leaking
through timing side-channel. By sending large number of attacker-selected
ciphertexts, the attacker would be able to decrypt a previously intercepted
PKCS#1 v1.5 ciphertext (for example, to decrypt a TLS session that used RSA
key exchange), or forge a signature using the victim’s key. The issue was
fixed by implementing the implicit rejection algorithm, in which the NSS
returns a deterministic random message in case invalid padding is detected,
as proposed in the Marvin Attack paper. This vulnerability affects NSS <
3.61.

Bugs

Notes

Author Note
mdeslaur The fix for this issue was incomplete, leading to CVE-2023-5388
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchnss< anyUNKNOWN
ubuntu20.04noarchnss< 2:3.98-0ubuntu0.20.04.1UNKNOWN
ubuntu14.04noarchnss< anyUNKNOWN
ubuntu16.04noarchnss< anyUNKNOWN

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.1%