Observable Timing Discrepancy Affecting gnutls package, versions [,3.8.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
2.94% (86th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-GNUTLS-3322485
  • published16 Feb 2023
  • disclosed14 Feb 2023
  • creditHubert Kario

Introduced: 14 Feb 2023

CVE-2023-0361  (opens in a new tab)
CWE-203  (opens in a new tab)

How to fix?

Upgrade gnutls to version 3.8.0 or higher.

Overview

Affected versions of this package are vulnerable to Observable Timing Discrepancy in the TLS RSA key exchange code. This side-channel may be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack (Marvin). To achieve a successful decryption, the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVSS Base Scores

version 3.1