Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-16869

Опубликовано: 03 дек. 2018
Источник: debian
EPSS Низкий

Описание

A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nettlefixed3.4.1~rc1-1package
nettleno-dsastretchpackage
nettleno-dsajessiepackage

Примечания

  • http://cat.eyalro.net/

  • https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html

  • The upstream correction also makes a new public function that packages using

  • nettle should use. This means that fixing this CVE is a pre-requisite for

  • fixing other CVEs like CVE-2018-16868.

EPSS

Процентиль: 29%
0.00106
Низкий

Связанные уязвимости

CVSS3: 5.7
ubuntu
около 7 лет назад

A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 4.7
redhat
около 7 лет назад

A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 5.7
nvd
около 7 лет назад

A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

suse-cvrf
около 7 лет назад

Security update for libnettle

suse-cvrf
около 7 лет назад

Security update for libnettle

EPSS

Процентиль: 29%
0.00106
Низкий