First published: Tue Sep 26 2017(Updated: )
A cryptographic cache-based side channel in the RSA implementation in Botan before 1.10.17, and 1.11.x and 2.x before 2.3.0, allows a local attacker to recover information about RSA secret keys, as demonstrated by CacheD. This occurs because an array is indexed with bits derived from a secret key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Botan | <=1.10.16 | |
Botan | =1.11.0 | |
Botan | =1.11.1 | |
Botan | =1.11.2 | |
Botan | =1.11.3 | |
Botan | =1.11.4 | |
Botan | =1.11.5 | |
Botan | =1.11.6 | |
Botan | =1.11.7 | |
Botan | =1.11.8 | |
Botan | =1.11.9 | |
Botan | =1.11.10 | |
Botan | =1.11.11 | |
Botan | =1.11.12 | |
Botan | =1.11.13 | |
Botan | =1.11.14 | |
Botan | =1.11.15 | |
Botan | =1.11.16 | |
Botan | =1.11.17 | |
Botan | =1.11.18 | |
Botan | =1.11.19 | |
Botan | =1.11.20 | |
Botan | =1.11.21 | |
Botan | =1.11.22 | |
Botan | =1.11.23 | |
Botan | =1.11.24 | |
Botan | =1.11.25 | |
Botan | =1.11.26 | |
Botan | =1.11.27 | |
Botan | =1.11.28 | |
Botan | =1.11.33 | |
Botan | =1.11.34 | |
Botan | =2.0.0 | |
Botan | =2.0.1 | |
Botan | =2.1.0 | |
Botan | =2.2.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-14737 is categorized as high, as it allows local attackers to recover information about RSA secret keys.
To fix CVE-2017-14737, update Botan to version 1.10.17 or later, or to versions 2.3.0 or later.
CVE-2017-14737 affects Botan versions before 1.10.17 and all 1.11.x and 2.x versions prior to 2.3.0.
Local attackers are impacted by CVE-2017-14737 as they can exploit the vulnerability to extract RSA secret keys.
CVE-2017-14737 is a cryptographic cache-based side channel vulnerability specifically within the RSA implementation in Botan.