First published: Thu Oct 25 2018(Updated: )
A flaw was found in OpenSSL versions from 1.1.0 through 1.1.0i inclusive and version 1.1.1. The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. References: <a href="https://www.openssl.org/news/secadv/20181029.txt">https://www.openssl.org/news/secadv/20181029.txt</a> Upstream Patch: <a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1</a> <a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4</a>
Credit: openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1:1.0.2k-16.el7_6.1 | 1:1.0.2k-16.el7_6.1 |
redhat/openssl | <1:1.1.1c-2.el8 | 1:1.1.1c-2.el8 |
redhat/openssl | <1.1.0 | 1.1.0 |
redhat/openssl | <1.1.1 | 1.1.1 |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.14-1~deb12u1 3.0.14-1~deb12u2 3.3.2-1 | |
OpenSSL | >=1.1.0<=1.1.0i | |
OpenSSL | =1.1.1 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Debian | =8.0 | |
Debian | =9.0 | |
Node.js | >=10.0.0<10.12.0 | |
Node.js | >=11.0.0<11.3.0 | |
Node.js | =10.13.0 | |
All of | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
NetApp Cloud Backup | ||
NetApp Element OS | ||
NetApp OnCommand Unified Manager for Windows | ||
NetApp OnCommand Unified Manager for vSphere | >=9.4 | |
NetApp SANtricity SMI-S Provider Firmware | ||
NetApp SMI-S Provider | ||
NetApp SnapDrive for Unix | ||
NetApp SnapDrive for Windows | ||
NetApp SteelStore Cloud Integrated Storage | ||
Oracle API Gateway | =11.1.2.4.0 | |
Oracle Java System Application Server | =0.9.8 | |
Oracle Java System Application Server | =1.0.0 | |
Oracle Java System Application Server | =1.0.1 | |
Oracle Enterprise Manager | =12.1.0.5.0 | |
Oracle Enterprise Manager | =13.2.0.0.0 | |
Oracle Enterprise Manager | =13.3.0.0.0 | |
Oracle Enterprise Manager Ops Center | =12.3.3 | |
Oracle MySQL | <=5.6.42 | |
Oracle MySQL | >=5.7.0<=5.7.24 | |
Oracle MySQL | >=8.0.0<=8.0.13 | |
Oracle Peoplesoft Enterprise Campus Software Campus Community | =8.55 | |
Oracle Peoplesoft Enterprise Campus Software Campus Community | =8.56 | |
Oracle Peoplesoft Enterprise Campus Software Campus Community | =8.57 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | >=17.7<=17.12 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =8.4 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =15.1 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =15.2 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =16.1 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =16.2 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =18.8 | |
Tarantella Secure Global Desktop | =5.4 | |
Oracle Tuxedo | =12.1.1.0.0 | |
Oracle VirtualBox | <6.0.0 | |
Oracle VirtualBox | >=5.0.0<5.2.24 | |
NetApp CN1610 | ||
NetApp CN1610 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0735 has been classified with a high severity level due to its potential to allow attackers to recover private keys through a timing side channel attack.
To remediate CVE-2018-0735, update OpenSSL to a version that is not vulnerable, such as 1:1.0.2k-16.el7_6.1 or 1.1.1c-2.el8.
CVE-2018-0735 affects OpenSSL versions from 1.1.0 to 1.1.0i inclusive, and version 1.1.1.
Yes, CVE-2018-0735 can potentially be exploited remotely if an attacker can observe the timing of ECDSA signatures.
Systems using OpenSSL versions 1.1.0 through 1.1.0i and 1.1.1, including many Linux distributions like Red Hat and Ubuntu, are likely affected by CVE-2018-0735.