A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/106092 | vdb entry third party advisory broken link |
http://cat.eyalro.net/ | third party advisory technical description |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869 | issue tracking third party advisory |