Site icon API Security Blog

Medium: nss-softokn

Issue Overview: It was discovered that the numerical library used in NSS for RSA cryptography leaks information whether high order bits of the RSA decryption result are zero. This information can be used to mount a Bleichenbacher or Manger like attack against all RSA decryption operations. As the leak happens before any padding operations, it affects all padding modes: PKCS#1 v1.5, OAEP, and RSASVP. Both API level calls and TLS server operation are affected. (CVE-2023-5388) Affected Packages: nss-softokn Issue Correction: Run yum update nss-softokn to update your system. New Packages: i686:     nss-softokn-freebl-devel-3.53.1-6.49.amzn1.i686     nss-softokn-freebl-3.53.1-6.49.amzn1.i686     nss-softokn-devel-3.53.1-6.49.amzn1.i686     nss-softokn-debuginfo-3.53.1-6.49.amzn1.i686     nss-softokn-3.53.1-6.49.amzn1.i686 src:     nss-softokn-3.53.1-6.49.amzn1.src x86_64:     nss-softokn-debuginfo-3.53.1-6.49.amzn1.x86_64     nss-softokn-freebl-devel-3.53.1-6.49.amzn1.x86_64     nss-softokn-devel-3.53.1-6.49.amzn1.x86_64     nss-softokn-freebl-3.53.1-6.49.amzn1.x86_64     nss-softokn-3.53.1-6.49.amzn1.x86_64 Additional References Red Hat: CVE-2023-5388 Mitre:…Read More

Exit mobile version