Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-12440

Опубликовано: 13 июн. 2018
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

BoringSSL through 2018-06-14 allows a memory-cache side-channel attack on DSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a DSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7camelWill not fix
Red Hat Mobile Application Platform 4netty-tcnative-boringssl-staticNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-385
https://bugzilla.redhat.com/show_bug.cgi?id=1591911netty-tcnative-boringssl-static: memory-cache side-channel attack on DSA signatures

EPSS

Процентиль: 4%
0.00019
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
nvd
больше 7 лет назад

BoringSSL through 2018-06-14 allows a memory-cache side-channel attack on DSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a DSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

CVSS3: 4.7
debian
больше 7 лет назад

BoringSSL through 2018-06-14 allows a memory-cache side-channel attack ...

CVSS3: 4.7
github
больше 3 лет назад

BoringSSL through 2018-06-14 allows a memory-cache side-channel attack on DSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a DSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

EPSS

Процентиль: 4%
0.00019
Низкий

5.5 Medium

CVSS3