cryptlib through 3.4.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. NOTE: the vendor does not include side-channel attacks within its threat model
References
Link | Resource |
---|---|
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ | Exploit Technical Description Third Party Advisory |
Configurations
History
07 Nov 2023, 02:52
Type | Values Removed | Values Added |
---|---|---|
Summary | cryptlib through 3.4.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. NOTE: the vendor does not include side-channel attacks within its threat model |
09 Mar 2021, 15:10
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:openbsd:libressl:-:*:*:*:*:*:*:* cpe:2.3:a:botan_project:botan:-:*:*:*:*:*:*:* cpe:2.3:a:wolfssl:wolfcrypt:-:*:*:*:*:*:*:* cpe:2.3:a:matrixssl:matrixssl:-:*:*:*:*:*:*:* cpe:2.3:a:google:boringssl:-:*:*:*:*:*:*:* cpe:2.3:a:libtom:libtomcrypt:-:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:-:*:*:*:*:*:*:* cpe:2.3:a:libsunec_project:libsunec:-:*:*:*:*:*:*:* cpe:2.3:a:gnupg:libgcrypt:-:*:*:*:*:*:*:* |
Information
Published : 2018-06-15 02:29
Updated : 2024-04-11 01:00
NVD link : CVE-2018-12433
Mitre link : CVE-2018-12433
CVE.ORG link : CVE-2018-12433
JSON object : View
Products Affected
cryptlib
- cryptlib