A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869 | Issue Tracking Third Party Advisory |
http://cat.eyalro.net/ | Technical Description Third Party Advisory |
http://www.securityfocus.com/bid/106092 | Broken Link Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-12-03 06:29
Updated : 2023-02-03 06:25
NVD link : CVE-2018-16869
Mitre link : CVE-2018-16869
JSON object : View
CWE
CWE-203
Observable Discrepancy
Products Affected
nettle_project
- nettle