5.9 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
49.3%
Botan 2.5.0 through 2.6.0 before 2.7.0 allows a memory-cache side-channel
attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or
ROHNP, related to dsa/dsa.cpp, ec_group/ec_group.cpp, and ecdsa/ecdsa.cpp.
To discover an ECDSA key, the attacker needs access to either the local
machine or a different virtual machine on the same physical host.
Author | Note |
---|---|
msalvatore | From the release notes, “versions before 2.5.0 are not affected” |
github.com/randombit/botan/commit/48fc8df51d99f9d8ba251219367b3d629cc848e3
github.com/randombit/botan/pull/1604
launchpad.net/bugs/cve/CVE-2018-12435
nvd.nist.gov/vuln/detail/CVE-2018-12435
security-tracker.debian.org/tracker/CVE-2018-12435
www.cve.org/CVERecord?id=CVE-2018-12435
www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
5.9 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
49.3%