First published: Fri Jun 15 2018(Updated: )
** DISPUTED ** cryptlib through 3.4.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. NOTE: the vendor does not include side-channel attacks within its threat model.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libgcrypt | <=3.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12433 is considered a medium severity vulnerability due to potential key exposure through a side-channel attack.
To mitigate CVE-2018-12433, upgrade to a version of cryptlib later than 3.4.4 that patches this vulnerability.
The impact of CVE-2018-12433 includes the possibility of an attacker discovering cryptographic keys through a memory-cache side-channel attack.
CVE-2018-12433 affects users of cryptlib versions up to and including 3.4.4.
CVE-2018-12433 allows for a memory-cache side-channel attack against DSA and ECDSA signatures.