First published: Mon Dec 03 2018(Updated: )
A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU GnuTLS | <=3.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-16868.
The severity of CVE-2018-16868 is medium with a CVSS score of 5.6.
The software affected by CVE-2018-16868 is Gnu Gnutls version up to and including 3.6.4.
The CWE ID for CVE-2018-16868 is CWE-203.
An attacker who is able to run a process on the same physical core as the victim process can exploit this vulnerability using a side-channel based padding oracle attack to extract plaintext or downgrade an encryption connection.