CVE-2018-16869
Publication date 3 December 2018
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
Status
Package | Ubuntu Release | Status |
---|---|---|
nettle | ||
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Fixed 3.4.1-0ubuntu0.18.04.1
|
|
16.04 LTS xenial | Ignored change too intrusive | |
14.04 LTS trusty | Ignored end of ESM support, was ignored [change too intrusive] |
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.7 · Medium |
Attack vector | Physical |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Changed |
Confidentiality | High |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-4990-1
- Nettle vulnerabilities
- 17 June 2021