CVE-2018-12433

cryptlib through 3.4.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. NOTE: the vendor does not include side-channel attacks within its threat model
References
Link Resource
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:cryptlib:cryptlib:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:52

Type Values Removed Values Added
Summary ** DISPUTED ** cryptlib through 3.4.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. NOTE: the vendor does not include side-channel attacks within its threat model. cryptlib through 3.4.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. NOTE: the vendor does not include side-channel attacks within its threat model

Information

Published : 2018-06-15 02:29

Updated : 2024-08-05 09:15


NVD link : CVE-2018-12433

Mitre link : CVE-2018-12433

CVE.ORG link : CVE-2018-12433


JSON object : View

Products Affected

cryptlib

  • cryptlib
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-320

Key Management Errors