LibTomCrypt through 1.18.1 allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
References
Link | Resource |
---|---|
https://security.gentoo.org/glsa/202007-53 | Third Party Advisory |
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ | Exploit Technical Description Third Party Advisory |
https://security.gentoo.org/glsa/202007-53 | Third Party Advisory |
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 03:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.gentoo.org/glsa/202007-53 - Third Party Advisory | |
References | () https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2018-06-15 02:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12437
Mitre link : CVE-2018-12437
CVE.ORG link : CVE-2018-12437
JSON object : View
Products Affected
libtom
- libtomcrypt
linaro
- op-tee
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor