Untriaged
Permalink
CVE-2023-50781
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
M2crypto: bleichenbacher timing attacks in the rsa decryption api - incomplete fix for cve-2020-25657
A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.
References
Affected products
pywbem
m2crypto
virt-who
Matching in nixpkgs
pkgs.python311Packages.pywbem
Support for the WBEM standard for systems management
pkgs.python312Packages.pywbem
Support for the WBEM standard for systems management
pkgs.python311Packages.m2crypto
Python crypto and SSL toolkit
-
nixos-unstable m2crypto-0.42.0
- nixpkgs-unstable m2crypto-0.42.0
- nixos-unstable-small m2crypto-0.42.0
pkgs.python312Packages.m2crypto
Python crypto and SSL toolkit
-
nixos-unstable m2crypto-0.42.0
- nixpkgs-unstable m2crypto-0.42.0
- nixos-unstable-small m2crypto-0.42.0