First published: Sat Jul 28 2018(Updated: )
ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows remote attackers to achieve partial plaintext recovery (for a CBC based ciphersuite) via a timing-based side-channel attack. This vulnerability exists because of an incorrect fix (with a wrong SHA-384 calculation) for CVE-2013-0169.
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
ARM mbed TLS | <2.1.14 | |
ARM mbed TLS | >=2.2.0<2.7.5 | |
ARM mbed TLS | >=2.8.0<2.12.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
ubuntu/mbedtls | <2.12.0-1 | 2.12.0-1 |
ubuntu/mbedtls | <2.2.1-2ubuntu0.3 | 2.2.1-2ubuntu0.3 |
ubuntu/polarssl | <1.3.9-2.1+ | 1.3.9-2.1+ |
debian/mbedtls | 2.16.9-0.1 2.28.3-1 2.28.8-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0497 is a vulnerability in ARM mbed TLS that allows remote attackers to achieve partial plaintext recovery via a timing-based side-channel attack.
CVE-2018-0497 works by exploiting a timing-based side-channel attack in the CBC based ciphersuite of ARM mbed TLS.
CVE-2018-0497 has a severity rating of 5.9, which is classified as medium.
ARM mbed TLS versions before 2.12.0, 2.7.5, and 2.1.14 are affected by CVE-2018-0497.
To fix CVE-2018-0497, update ARM mbed TLS to version 2.12.0 or later.