CVE-2018-16868

Published: Dic 03, 2018 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2018-8659 Aliases: GSD-2018-16868
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 4,7
Attack Vector: physical
Attack Complexity: high
Privileges Required: high
User Interaction: none
Scope: changed
Confidentiality: high
Integrity: none
Availability: none
LOW 3,3
Access Vector: local
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: none

Description

AI Translation Available

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0004
Percentile
0,1th
Updated

EPSS Score Trend (Last 90 Days)

203

Observable Discrepancy

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Access Control
Potential Impacts:
Read Application Data Bypass Protection Mechanism
Applicable Platforms
All platforms may be affected
View CWE Details
Application

Gnutls by Gnu

Version Range Affected
To 3.6.4 (inclusive)
cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://cat.eyalro.net/
Technical Description Third Party Advisory
http://cat.eyalro.net/
http://lists.opensuse.org/opensuse-security-announce/2019-0…
Broken Link Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2019-0…
Broken Link Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868
http://www.securityfocus.com/bid/106080
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/106080
http://cat.eyalro.net/
Technical Description Third Party Advisory
http://cat.eyalro.net/
http://lists.opensuse.org/opensuse-security-announce/2019-0…
Broken Link Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2019-0…
Broken Link Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868
http://www.securityfocus.com/bid/106080
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/106080