Vulnerability Details : CVE-2018-16869
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
Products affected by CVE-2018-16869
- cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-16869
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-16869
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:L/AC:M/Au:N/C:P/I:P/A:N |
3.4
|
4.9
|
NIST | |
4.7
|
MEDIUM | CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N |
0.3
|
4.0
|
Red Hat, Inc. | |
5.7
|
MEDIUM | CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N |
0.5
|
4.7
|
NIST |
CWE ids for CVE-2018-16869
-
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2018-16869
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869
1654930 – (CVE-2018-16869) CVE-2018-16869 nettle: Leaky data conversion exposing a manager oracleIssue Tracking;Third Party Advisory
-
http://cat.eyalro.net/
404 Page not found | Eyal RonenTechnical Description;Third Party Advisory
-
http://www.securityfocus.com/bid/106092
GNU Nettle CVE-2018-16869 Information Disclosure VulnerabilityBroken Link;Third Party Advisory;VDB Entry
Jump to