IBM GSKit-Crypto could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
https://www.ibm.com/support/pages/node/7010369 | vendor advisory |
https://www.ibm.com/support/pages/node/7022413 | vendor advisory |
https://www.ibm.com/support/pages/node/7022414 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/257132 |