Use of a Broken or Risky Cryptographic Algorithm
Affecting gnutls28 package, versions <3.4.10-4ubuntu1.5
Report new vulnerabilities
Do your applications use this vulnerable package?
Test your applications
Overview
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
References
CVSS Score
5.6
medium severity
-
Attack VectorLocal
-
Attack ComplexityHigh
-
Privileges RequiredLow
-
User InteractionNone
-
ScopeChanged
-
ConfidentialityHigh
-
IntegrityNone
-
AvailabilityNone
- CVE
- CVE-2018-10846
- CWE
- CWE-327 CWE-385
- Snyk ID
- SNYK-UBUNTU1604-GNUTLS28-340597
- Disclosed
- 22 Aug, 2018
- Published
- 25 Sep, 2018