Логотип exploitDog
bind:"CVE-2018-16868"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-16868"

Количество 11

Количество 11

ubuntu логотип

CVE-2018-16868

около 7 лет назад

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 5.6
EPSS: Низкий
redhat логотип

CVE-2018-16868

около 7 лет назад

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2018-16868

около 7 лет назад

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 5.6
EPSS: Низкий
debian логотип

CVE-2018-16868

около 7 лет назад

A Bleichenbacher type side-channel based padding oracle attack was fou ...

CVSS3: 5.6
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1477-1

больше 6 лет назад

Security update for gnutls

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1351-2

больше 6 лет назад

Security update for gnutls

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1351-1

больше 6 лет назад

Security update for gnutls

EPSS: Низкий
github логотип

GHSA-qjx3-4wr5-3c93

больше 3 лет назад

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 5.6
EPSS: Низкий
fstec логотип

BDU:2019-00776

около 7 лет назад

Уязвимость криптографической библиотеки GnuTLS, связанная с ошибкой проверки дешифрованных данных RSA, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 4.7
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1353-1

почти 7 лет назад

Security update for gnutls

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1121-1

почти 7 лет назад

Security update for gnutls

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-16868

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 5.6
0%
Низкий
около 7 лет назад
redhat логотип
CVE-2018-16868

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 4.7
0%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-16868

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 5.6
0%
Низкий
около 7 лет назад
debian логотип
CVE-2018-16868

A Bleichenbacher type side-channel based padding oracle attack was fou ...

CVSS3: 5.6
0%
Низкий
около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1477-1

Security update for gnutls

0%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1351-2

Security update for gnutls

0%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1351-1

Security update for gnutls

0%
Низкий
больше 6 лет назад
github логотип
GHSA-qjx3-4wr5-3c93

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 5.6
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-00776

Уязвимость криптографической библиотеки GnuTLS, связанная с ошибкой проверки дешифрованных данных RSA, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 4.7
0%
Низкий
около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1353-1

Security update for gnutls

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:1121-1

Security update for gnutls

почти 7 лет назад

Уязвимостей на страницу