iTnews Asia
  • Home
  • News
  • Security

"Marvin" breathes new life into Bleichenbacher's timing oracle attack

"Marvin" breathes new life into Bleichenbacher's timing oracle attack

RSA PKCS#1 v1.5 encryption is ancient and should not be used.

By Richard Chirgwin on Sep 27, 2023 12:24PM

An ancient timing oracle attack against RSA encryption has re-emerged, with a Red Hat researcher saying an oracle attack first discovered in 1998 by Daniel Bleichenbacher remains exploitable.

Bleichenbacher’s vulnerability has re-emerged several times over the years, the last time in 2018 when researchers Hanno Böck, Jurau Somorovsky and Craig Young published ROBOT, “the Return of Bleichenbacher's Oracle Threat”.

What Bleichenbacher first discovered was that SSL servers returned error messages in the PKCS #1 v1.5 padding that enabled an attack on the ciphertext which broke the confidentiality of Transaction Layer Security (TLS) using RSA encryption.

An attacker who could observe the time of the decryption operation performed with the private key could decrypt captured RSA messages.

The new attack, dubbed Marvin (a nod towards both The Hitchhikers Guide to the Galaxy and the previous ROBOT attack), was published here by Czech Red Hat researcher Hubert Kario.

He discovered that by using more statistically rigorous techniques than Bleichenbacher, the attack could still succeed against a number of cryptographic implementations, including OpenSSL, GnuTLS, Mozilla’s NSS (which Kario says remains vulnerable in spite of a patch), pyca/cryptography (only partially fixed), M2Crypto, and OpenSSL-ibmca.

His site provides a list of CVEs.

Kario worked for years on his attack, saying that while patches for the issue emerged between 2020 and 2023, two problems made for slow progress.

“First … we were struggling with false positives caused by the timing signal generated by the harness (test script)”, Kario wrote.

That caused the other issue: “Because of unreliable results it was hard to pinpoint the particular cause for the timing signal and without that, it was hard to convince upstream developers to work on the issue.

“Only when we created a constant-time test harness were we able to move forward with fixes (and that happened in the middle of 2022).”

Kario has published scripts to help test implementations for the vulnerability.

He also said system logs could provide some indication whether or not an attack has been launched against a system: “If you run a server and can be certain no one made a large number of connections that attempted RSA key exchange to any of your servers … then you weren’t attacked.”

Chiefly, however, Kario said, people should “stop using RSA PKCS#1 v1.5 encryption”, even if they believe they need it for backwards compatibility.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
bleichenbacher marvin rsa security

Related Articles

  • Your organisation’s physical security can be a gateway for cybercriminals
  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

Your organisation’s physical security can be a gateway for cybercriminals

Your organisation’s physical security can be a gateway for cybercriminals

What are the most pressing cyber security concerns going into 2025?

What are the most pressing cyber security concerns going into 2025?

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.