Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-10845

Опубликовано: 22 авг. 2018
Источник: debian
EPSS Низкий

Описание

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnutls28fixed3.5.19-1package
gnutls28fixed3.5.8-5+deb9u4stretchpackage
gnutls26removedpackage

Примечания

  • https://gitlab.com/gnutls/gnutls/issues/455

  • https://gitlab.com/gnutls/gnutls/commit/cc14ec5ece856cb083d64e6a5a8657323da661cb (master)

  • https://gitlab.com/gnutls/gnutls/commit/e14d85eb8b1987d86f7b1d101a0e7795675d20d4 (gnutls_3_5_19)

  • https://gitlab.com/gnutls/gnutls/merge_requests/657

  • https://eprint.iacr.org/2018/747

EPSS

Процентиль: 77%
0.01093
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 7 лет назад

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
redhat
около 7 лет назад

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
nvd
около 7 лет назад

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
github
больше 3 лет назад

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
fstec
больше 7 лет назад

Уязвимость реализации механизма HMAC-SHA-384 криптографической библиотеки GnuTLS, позволяющая нарушителю осуществить атаку типа «Lucky 13» и атаку с восстановлением открытого текста

EPSS

Процентиль: 77%
0.01093
Низкий