Id:
CVE-2018-16869
Comment
:
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
CVSSv2 Score:
3.3
Access vector:
|
LOCAL
|
Access complexity:
|
MEDIUM
|
Authentication:
|
NONE
|
Confidentiality impact:
|
PARTIAL
|
Integrity impact:
|
PARTIAL
|
Availability impact:
|
NONE
|
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:P/A:N
CVSSv3 Score:
5.7
Attack vector:
|
PHYSICAL
|
Attack complexity:
|
HIGH
|
Privileges required:
|
NONE
|
User interaction:
|
NONE
|
Scope:
|
CHANGED
|
Confidentiality impact:
|
HIGH
|
Integrity impact:
|
LOW
|
Availability impact:
|
NONE
|
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N
References: