A side-channel attack against this implementation of TLS exists that, through analysis of the timing of certain operations, can reveal sensitive information to an active adversary. This information leaked by the vulnerable implementation may be sufficient for an adaptive attack that will ultimately obtain plaintext of a target block of ciphertext. It is likely that this condition is similar to the weakness described in BID 6884.
A side-channel attack against this implementation of TLS exists that, through analysis of the timing of certain operations, can reveal sensitive information to an active adversary. This information leaked by the vulnerable implementation may be sufficient for an adaptive attack that will ultimately obtain plaintext of a target block of ciphertext. It is likely that this condition is similar to the weakness described in BID 6884.