Moderate severityNVD Advisory· Published Nov 28, 2023· Updated Nov 27, 2024
RustCrypto/RSA vulnerable to a Marvin Attack via key recovery through timing sidechannels
CVE-2023-49092
Description
RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key. There is currently no fix available. As a workaround, avoid using the RSA crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
rsacrates.io | <= 0.9.6 | — |
Affected products
1- Range: <= 0.9.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-c38w-74pg-36hrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-49092ghsaADVISORY
- github.com/RustCrypto/RSA/issues/19ghsax_refsource_MISCWEB
- github.com/RustCrypto/RSA/issues/626ghsaWEB
- github.com/RustCrypto/RSA/security/advisories/GHSA-c38w-74pg-36hrghsax_refsource_CONFIRMWEB
- rustsec.org/advisories/RUSTSEC-2023-0071.htmlghsaWEB
News mentions
0No linked articles in our index yet.