Логотип exploitDog
bind:CVE-2018-16869
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-16869

Количество 8

Количество 8

ubuntu логотип

CVE-2018-16869

около 7 лет назад

A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 5.7
EPSS: Низкий
redhat логотип

CVE-2018-16869

около 7 лет назад

A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2018-16869

около 7 лет назад

A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 5.7
EPSS: Низкий
debian логотип

CVE-2018-16869

около 7 лет назад

A Bleichenbacher type side-channel based padding oracle attack was fou ...

CVSS3: 5.7
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:4260-1

около 7 лет назад

Security update for libnettle

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:4193-1

около 7 лет назад

Security update for libnettle

EPSS: Низкий
github логотип

GHSA-575w-jrpq-q9xv

больше 3 лет назад

A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 5.7
EPSS: Низкий
fstec логотип

BDU:2019-00777

около 7 лет назад

Уязвимость криптографической библиотеки Nettle, связана с ошибкой обратного преобразования дешифрованных данных RSA, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-16869

A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 5.7
0%
Низкий
около 7 лет назад
redhat логотип
CVE-2018-16869

A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 4.7
0%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-16869

A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 5.7
0%
Низкий
около 7 лет назад
debian логотип
CVE-2018-16869

A Bleichenbacher type side-channel based padding oracle attack was fou ...

CVSS3: 5.7
0%
Низкий
около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:4260-1

Security update for libnettle

0%
Низкий
около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:4193-1

Security update for libnettle

0%
Низкий
около 7 лет назад
github логотип
GHSA-575w-jrpq-q9xv

A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVSS3: 5.7
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-00777

Уязвимость криптографической библиотеки Nettle, связана с ошибкой обратного преобразования дешифрованных данных RSA, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 4.7
0%
Низкий
около 7 лет назад

Уязвимостей на страницу