First published: Mon Dec 03 2018(Updated: )
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nettle Project Nettle | <=3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16869 is a vulnerability that allows a Bleichenbacher type side-channel based padding oracle attack in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data.
The severity of CVE-2018-16869 is medium, with a severity value of 5.7.
Nettle Project Nettle version up to and including 3.4 is affected by CVE-2018-16869.
An attacker who is able to run a process on the same physical core as the victim process can use this vulnerability to extract plaintext or in some cases perform other malicious actions.
Yes, you can find more information about CVE-2018-16869 at the following links: [http://cat.eyalro.net/](http://cat.eyalro.net/), [http://www.securityfocus.com/bid/106092](http://www.securityfocus.com/bid/106092), [https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869)