A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/106080 | vdb entry third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html | mailing list broken link third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html | mailing list broken link third party advisory vendor advisory |
http://cat.eyalro.net/ | third party advisory technical description |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868 | issue tracking third party advisory |