Daniel Bleichenbacher’s attack is an adaptive chosen-ciphertext attack against RSA PKCS#1 v1.5 encryption block formatting. New variations use the overall TCP connection state as a possible side channel and use a nonstandard, abbreviated TLS message flow. The new research focused on identifying current TLS implementations affected by the classic attack or those affected by newly introduced variations. The following vulnerabilities were identified based on this research. The vulnerability has been assigned the following CVE ID: CVE-2017-17428.”]

