Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-12904
HistoryJun 20, 2019 - 12:00 a.m.

CVE-2019-12904

2019-06-2000:00:00
ubuntu.com
ubuntu.com
12

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

48.8%

DISPUTED In Libgcrypt 1.8.4, the C implementation of AES is
vulnerable to a flush-and-reload side-channel attack because physical
addresses are available to other processes. (The C implementation is used
on platforms where an assembly-language implementation is unavailable.)
NOTE: the vendor’s position is that the issue report cannot be validated
because there is no description of an attack.

Bugs

Notes

Author Note
mdeslaur see: https://lists.gnupg.org/pipermail/gcrypt-devel/2019-July/004760.html Upstream developers have disputed this issue, so marking as not-affected

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

48.8%