First published: Fri May 25 2018(Updated: )
It was found that GnuTLS implementation of HMAC-SHA-384 was vulnerable to Lucky thirteen style attack due to use of wrong constant appropriate to hash functions that encode the length field.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU GnuTLS | <3.6.12 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Canonical Ubuntu Linux | =19.04 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Debian Debian Linux | =8.0 | |
debian/gnutls28 | 3.7.1-5+deb11u5 3.7.1-5+deb11u6 3.7.9-2+deb12u3 3.8.8-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-201-10845 is a vulnerability found in the GnuTLS implementation of HMAC-SHA-384, which is vulnerable to a Lucky thirteen style attack.
The severity of CVE-2018-10845 is medium with a CVSS score of 5.9.
CVE-2018-10845 affects the GnuTLS implementation of HMAC-SHA-384, allowing remote attackers to conduct distinguishing attacks and plain text recovery attacks.
The affected versions of GnuTLS are 3.5.18-1ubuntu1.1, 3.5.19-3.6.3, 3.4.10-4ubuntu1.5, 3.6.7-4+deb10u8, 3.6.7-4+deb10u10, 3.7.1-5+deb11u3, 3.7.9-2, and 3.8.1-4.
To fix CVE-2018-10845, update GnuTLS to version 3.5.19, 3.6.3, 3.4.10-4ubuntu1.5, 3.6.7-4+deb10u8, 3.6.7-4+deb10u10, 3.7.1-5+deb11u3, 3.7.9-2, or 3.8.1-4.