Unrated severityNVD Advisory· Published Dec 3, 2018· Updated Aug 5, 2024
CVE-2018-16868
CVE-2018-16868
Description
A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
Affected products
5- osv-coords5 versionspkg:rpm/opensuse/gnutls&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/gnutls&distro=openSUSE%20Leap%2015.1pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015
< 3.6.7-lp150.9.1+ 4 more
- (no CPE)range: < 3.6.7-lp150.9.1
- (no CPE)range: < 3.6.7-lp151.2.3.1
- (no CPE)range: < 3.6.7-6.8.1
- (no CPE)range: < 3.6.7-6.11.1
- (no CPE)range: < 3.6.7-6.8.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.htmlmitrevendor-advisoryx_refsource_SUSE
- cat.eyalro.netmitrex_refsource_MISC
- www.securityfocus.com/bid/106080mitrevdb-entryx_refsource_BID
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.