Do your applications use this vulnerable package?
Test your applications
Overview
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
References
CVSS Score
5.7
low severity
-
Attack VectorPhysical
-
Attack ComplexityHigh
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeChanged
-
ConfidentialityHigh
-
IntegrityLow
-
AvailabilityNone
- CVE
- CVE-2018-16869
- CWE
- CWE-203
- Snyk ID
- SNYK-UBUNTU1804-NETTLE-302013
- Disclosed
- 03 Dec, 2018
- Published
- 03 Dec, 2018