Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-12904

Опубликовано: 16 июл. 2019
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack

[Disputed] A vulnerability has been identified in Libgcrypt due to a flaw in its C implementation of AES. This vulnerability enables a remote attacker to perform a flush-and-reload side-channel attack, potentially accessing sensitive information. The vulnerability arises from the availability of physical addresses to other processes, particularly on platforms lacking an assembly-language implementation.

Отчет

Please note that this issue is more theoretical than practical in terms of potential attack scenarios. The upstream developers have disputed this CVE, and the patches they supplied seem to focus more on hardening. Refer to external references for further details. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-385: Covert Timing Channel vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform enforces hardening guidelines to apply the most restrictive configurations necessary to meet operational requirements. Baseline settings and configuration controls ensure secure system and software configurations, while least functionality reduces the attack surface by limiting unnecessary system features and timing variations, thereby decreasing the risk of covert timing channels. Event logs are collected and processed for centralization, correlation, analysis, monitoring, alerting, and retention, supporting the detection of anomalous timing-based behavior that could indicate covert channel exploitation. Static code analysis and peer code reviews enforce robust input validation and error-handling practices, helping prevent unauthorized data transmission. Additionally, process isolation and encryption of data at rest limit the impact of successful exploitation by isolating compromised processes and preventing unauthorized data access or leakage across workloads.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5libgcryptWill not fix
Red Hat Enterprise Linux 6libgcryptWill not fix
Red Hat Enterprise Linux 7libgcryptWill not fix
Red Hat Enterprise Linux 8libgcryptWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-385
https://bugzilla.redhat.com/show_bug.cgi?id=1730320Libgcrypt: physical addresses being available to other processes leads to a flush-and-reload side-channel attack

EPSS

Процентиль: 41%
0.00191
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 6 лет назад

In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack

CVSS3: 5.9
nvd
больше 6 лет назад

In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack

CVSS3: 5.9
debian
больше 6 лет назад

In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flu ...

suse-cvrf
больше 6 лет назад

Security update for libgcrypt

suse-cvrf
больше 6 лет назад

Security update for libgcrypt

EPSS

Процентиль: 41%
0.00191
Низкий

5.9 Medium

CVSS3