// For flags

CVE-2023-4421

Ubuntu Security Notice USN-6727-1

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The NSS code used for checking PKCS#1 v1.5 was leaking information useful in mounting Bleichenbacher-like attacks. Both the overall correctness of the padding as well as the length of the encrypted message was leaking through timing side-channel. By sending large number of attacker-selected ciphertexts, the attacker would be able to decrypt a previously intercepted PKCS#1 v1.5 ciphertext (for example, to decrypt a TLS session that used RSA key exchange), or forge a signature using the victim's key. The issue was fixed by implementing the implicit rejection algorithm, in which the NSS returns a deterministic random message in case invalid padding is detected, as proposed in the Marvin Attack paper. This vulnerability affects NSS < 3.61.

El código NSS utilizado para comprobar PKCS#1 v1.5 estaba filtrando información útil para montar ataques tipo Bleichenbacher. Tanto la exactitud general del relleno como la longitud del mensaje cifrado se filtraban a través del canal lateral de sincronización. Al enviar una gran cantidad de textos cifrados seleccionados por el atacante, el atacante podría descifrar un texto cifrado PKCS#1 v1.5 previamente interceptado (por ejemplo, para descifrar una sesión TLS que utilizó el intercambio de claves RSA) o falsificar una firma utilizando el código de la víctima. llave. El problema se solucionó implementando el algoritmo de rechazo implícito, en el que NSS devuelve un mensaje aleatorio determinista en caso de que se detecte un relleno no válido, como se propone en el artículo de Marvin Attack. Esta vulnerabilidad afecta a NSS &lt; 3.61.

USN-6727-1 fixed vulnerabilities in NSS. The update introduced a regression when trying to load security modules on Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. This update fixes the problem. It was discovered that NSS incorrectly handled padding when checking PKCS#1 certificates. A remote attacker could possibly use this issue to perform Bleichenbacher-like attacks and recover private data. This issue only affected Ubuntu 20.04 LTS. It was discovered that NSS had a timing side-channel when performing RSA decryption. A remote attacker could possibly use this issue to recover private data. It was discovered that NSS had a timing side-channel when using certain NIST curves. A remote attacker could possibly use this issue to recover private data. The NSS package contained outdated CA certificates. This update refreshes the NSS package to version 3.98 which includes the latest CA certificate bundle and other security improvements.

*Credits: Hubert Kario
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-08-18 CVE Reserved
  • 2023-12-12 CVE Published
  • 2024-08-02 CVE Updated
  • 2025-05-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-203: Observable Discrepancy
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Nss
Search vendor "Mozilla" for product "Nss"
< 3.6.1
Search vendor "Mozilla" for product "Nss" and version " < 3.6.1"
-
Affected