Количество 8
Количество 8
CVE-2018-16869
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
CVE-2018-16869
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
CVE-2018-16869
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
CVE-2018-16869
A Bleichenbacher type side-channel based padding oracle attack was fou ...
openSUSE-SU-2018:4260-1
Security update for libnettle
SUSE-SU-2018:4193-1
Security update for libnettle
GHSA-575w-jrpq-q9xv
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
BDU:2019-00777
Уязвимость криптографической библиотеки Nettle, связана с ошибкой обратного преобразования дешифрованных данных RSA, позволяющая нарушителю получить доступ к защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-16869 A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server. | CVSS3: 5.7 | 0% Низкий | около 7 лет назад | |
CVE-2018-16869 A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server. | CVSS3: 4.7 | 0% Низкий | около 7 лет назад | |
CVE-2018-16869 A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server. | CVSS3: 5.7 | 0% Низкий | около 7 лет назад | |
CVE-2018-16869 A Bleichenbacher type side-channel based padding oracle attack was fou ... | CVSS3: 5.7 | 0% Низкий | около 7 лет назад | |
openSUSE-SU-2018:4260-1 Security update for libnettle | 0% Низкий | около 7 лет назад | ||
SUSE-SU-2018:4193-1 Security update for libnettle | 0% Низкий | около 7 лет назад | ||
GHSA-575w-jrpq-q9xv A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server. | CVSS3: 5.7 | 0% Низкий | больше 3 лет назад | |
BDU:2019-00777 Уязвимость криптографической библиотеки Nettle, связана с ошибкой обратного преобразования дешифрованных данных RSA, позволяющая нарушителю получить доступ к защищаемой информации | CVSS3: 4.7 | 0% Низкий | около 7 лет назад |
Уязвимостей на страницу