ID

VAR-E-200102-0124


TITLE

PKCS #1 Version 1.5 Session Key Retrieval Vulnerability

Trust: 0.3

sources: BID: 2344

DESCRIPTION

The data encryption techniques described in RSA's PKCS #1 standard are used in many protocols which rely on, at least in part, the security provided by public-key cryptography systems.
Several protocols which implement the digital enveloping method described in version 1.5 of the PKCS #1 standard are susceptible to an adaptive ciphertext attack which may allow the recovery of session keys, thus compromising the integrity of the data transmitting during that session.
By capturing and logging the packets transmitted between a client and a server, an opponent could make use of a captured encrypted session key to launch a Bleichenbacher attack together with a simple timing attack. If the session key is successfully decrypted, the saved packets can easily be decrypted in a uniform manner.
Interactive key establishment protocols, such as SSH or SSL, are generally significantly more susceptible to successful attacks.

Trust: 0.3

sources: BID: 2344

AFFECTED PRODUCTS

vendor:sshmodel:communications security sshscope:eqversion:1.2.31

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:2.1.1

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:2.1

Trust: 0.3

vendor:opensshmodel:opensshscope:eqversion:1.2.3

Trust: 0.3

vendor:ciscomodel:webns 0b17sscope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:webns 0b13sscope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:webns b19sscope:eqversion:4.0.1

Trust: 0.3

vendor:ciscomodel:webnsscope:eqversion:4.0.1

Trust: 0.3

vendor:ciscomodel:webns 1b29sscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:webns 1b23sscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:webnsscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:webnsscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:webnsscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(5)

Trust: 0.3

vendor:ciscomodel:ios 12.2xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.3

vendor:ciscomodel:ios 12.1yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1xv

Trust: 0.3

vendor:ciscomodel:ios 12.1xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ezscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ecscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:60006.2(0.110)

Trust: 0.3

vendor:ciscomodel:webns b11sscope:neversion:5.0

Trust: 0.3

vendor:ciscomodel:webns 1b6sscope:neversion:5.0

Trust: 0.3

vendor:ciscomodel:webns 0b22sscope:neversion:4.1

Trust: 0.3

vendor:ciscomodel:webns 1b42sscope:neversion:4.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.0(1)

Trust: 0.3

vendor:ciscomodel:catalyst panscope:neversion:60006.3

Trust: 0.3

vendor:ciscomodel:catalystscope:neversion:60006.2(0.111)

Trust: 0.3

vendor:ciscomodel:catalystscope:neversion:60006.1(2.13)

Trust: 0.3

sources: BID: 2344

EXPLOIT

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

Trust: 0.3

sources: BID: 2344

PRICE

Free

Trust: 0.3

sources: BID: 2344

TYPE

Design Error

Trust: 0.3

sources: BID: 2344

CREDITS

This vulnerability was announced to Bugtraq in a Core SDI Advisory dated February 7, 2001.

Trust: 0.3

sources: BID: 2344

EXTERNAL IDS

db:BIDid:2344

Trust: 0.3

sources: BID: 2344

REFERENCES

url:http://www.cisco.com/warp/public/707/ssh-multiple-pub.html

Trust: 0.3

sources: BID: 2344

SOURCES

db:BIDid:2344

LAST UPDATE DATE

2022-07-27T09:29:19.693000+00:00


SOURCES UPDATE DATE

db:BIDid:2344date:2001-02-06T00:00:00

SOURCES RELEASE DATE

db:BIDid:2344date:2001-02-06T00:00:00