LibreSSL before 2.6.5 and 2.7.x before 2.7.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
References
Link | Resource |
---|---|
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ | Third Party Advisory |
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.4-relnotes.txt | Vendor Advisory |
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.6.5-relnotes.txt | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-06-14 19:29
Updated : 2018-08-06 09:54
NVD link : CVE-2018-12434
Mitre link : CVE-2018-12434
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
openbsd
- libressl