中危 nss 安全漏洞 (CVE-2023-4421)

CVE编号

CVE-2023-4421

利用情况

暂无

补丁情况

官方补丁

披露时间

2023-12-13
漏洞描述
The NSS code used for checking PKCS#1 v1.5 was leaking information useful in mounting Bleichenbacher-like attacks. Both the overall correctness of the padding as well as the length of the encrypted message was leaking through timing side-channel. By sending large number of attacker-selected ciphertexts, the attacker would be able to decrypt a previously intercepted PKCS#1 v1.5 ciphertext (for example, to decrypt a TLS session that used RSA key exchange), or forge a signature using the victim's key. The issue was fixed by implementing the implicit rejection algorithm, in which the NSS returns a deterministic random message in case invalid padding is detected, as proposed in the Marvin Attack paper. This vulnerability affects NSS < 3.61.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 mozilla nss * Up to
(excluding)
3.6.1
运行在以下环境
系统 amazon_AMI nss-softokn * Up to
(excluding)
3.53.1-6.48.amzn1
运行在以下环境
系统 debian_10 nss * Up to
(excluding)
3.42.1-1+deb10u7
运行在以下环境
系统 debian_11 nss * Up to
(excluding)
3.61-1
运行在以下环境
系统 debian_12 nss * Up to
(excluding)
3.61-1
阿里云评分
6.1
  • 攻击路径
    本地
  • 攻击复杂度
    困难
  • 权限要求
    普通权限
  • 影响范围
    有限影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-203 通过差异性导致的信息暴露
阿里云安全产品覆盖情况