Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-20187

Опубликовано: 08 мар. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.9

Описание

A side-channel issue was discovered in Botan before 2.9.0. An attacker capable of precisely measuring the time taken for ECC key generation may be able to derive information about the high bits of the secret key, as the function to derive the public point from the secret scalar uses an unblinded Montgomery ladder whose loop iteration count depends on the bitlength of the secret. This issue affects only key generation, not ECDSA signatures or ECDH key agreement.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

DNE

disco

not-affected

2.9.0-2
eoan

not-affected

2.9.0-2
esm-apps/bionic

needed

esm-apps/focal

not-affected

2.9.0-2
esm-apps/jammy

not-affected

2.9.0-2
esm-apps/noble

not-affected

2.9.0-2
esm-infra-legacy/trusty

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
cosmic

ignored

end of life
devel

DNE

disco

DNE

eoan

DNE

esm-apps/bionic

not-affected

code not present
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

needs-triage

esm-infra/focal

DNE

focal

DNE

Показывать по

EPSS

Процентиль: 65%
0.00487
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
почти 7 лет назад

A side-channel issue was discovered in Botan before 2.9.0. An attacker capable of precisely measuring the time taken for ECC key generation may be able to derive information about the high bits of the secret key, as the function to derive the public point from the secret scalar uses an unblinded Montgomery ladder whose loop iteration count depends on the bitlength of the secret. This issue affects only key generation, not ECDSA signatures or ECDH key agreement.

CVSS3: 5.9
debian
почти 7 лет назад

A side-channel issue was discovered in Botan before 2.9.0. An attacker ...

CVSS3: 5.9
github
больше 3 лет назад

A side-channel issue was discovered in Botan before 2.9.0. An attacker capable of precisely measuring the time taken for ECC key generation may be able to derive information about the high bits of the secret key, as the function to derive the public point from the secret scalar uses an unblinded Montgomery ladder whose loop iteration count depends on the bitlength of the secret. This issue affects only key generation, not ECDSA signatures or ECDH key agreement.

EPSS

Процентиль: 65%
0.00487
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3