Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-c38w-74pg-36hr: Marvin Attack: potential key recovery through timing sidechannels

Impact

Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key.

Patches

No patch is yet available, however work is underway to migrate to a fully constant-time implementation.

Workarounds

The only currently available workaround is to avoid using the rsa crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer is fine.

References

This vulnerability was discovered as part of the "Marvin Attack", which revealed several implementations of RSA including OpenSSL had not properly mitigated timing sidechannel attacks.

  • https://rustsec.org/advisories/RUSTSEC-2023-0071.html
  • https://people.redhat.com/~hkario/marvin/
  • https://github.com/RustCrypto/RSA/issues/19
ghsa
#vulnerability#git#perl#ssl

Package

cargo rsa (Rust)

Affected versions

<= 0.9.5

Patched versions

None

Description

Impact

Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key.

Patches

No patch is yet available, however work is underway to migrate to a fully constant-time implementation.

Workarounds

The only currently available workaround is to avoid using the rsa crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer is fine.

References

This vulnerability was discovered as part of the "Marvin Attack", which revealed several implementations of RSA including OpenSSL had not properly mitigated timing sidechannel attacks.

  • https://rustsec.org/advisories/RUSTSEC-2023-0071.html
  • https://people.redhat.com/~hkario/marvin/
  • RustCrypto/RSA#19

References

  • GHSA-c38w-74pg-36hr
  • https://nvd.nist.gov/vuln/detail/CVE-2023-49092
  • RustCrypto/RSA#19 (comment)

tarcieri published to RustCrypto/RSA

Nov 28, 2023

Published by the National Vulnerability Database

Nov 28, 2023

Published to the GitHub Advisory Database

Nov 28, 2023

Reviewed

Nov 28, 2023

Last updated

Nov 28, 2023

Related news

CVE-2023-49092: Marvin Attack: potential key recovery through timing sidechannels

RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key. There is currently no fix available. As a workaround, avoid using the RSA crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer.