Unrated severityNVD Advisory· Published Dec 3, 2018· Updated Aug 5, 2024
CVE-2018-16869
CVE-2018-16869
Description
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
Affected products
3- osv-coords2 versionspkg:rpm/suse/libnettle&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/libnettle&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015
< 3.4-4.3.1+ 1 more
- (no CPE)range: < 3.4-4.3.1
- (no CPE)range: < 3.4-4.3.1
- Range: n/a
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- cat.eyalro.netmitrex_refsource_MISC
- www.securityfocus.com/bid/106092mitrevdb-entryx_refsource_BID
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.