CVE-2018-16868

EUVD-2018-8659
A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.6 MEDIUM
PHYSICAL
HIGH
LOW
CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
redhatCNA
4.7 MEDIUM
PHYSICAL
HIGH
HIGH
CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 12%
Affected Products (NVD)
VendorProductVersion
gnugnutls
𝑥
≤ 3.6.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gnutls28
bookworm
3.7.9-2+deb12u3
fixed
bullseye
3.7.1-5+deb11u5
fixed
bullseye (security)
3.7.1-5+deb11u6
fixed
sid
3.8.6-2
fixed
stretch
no-dsa
trixie
3.8.6-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gnutls26
bionic
dne
cosmic
dne
disco
dne
eoan
dne
focal
dne
groovy
dne
hirsute
dne
impish
dne
jammy
dne
kinetic
dne
lunar
dne
trusty
ignored
xenial
dne
gnutls28
bionic
ignored
cosmic
ignored
disco
Fixed 3.6.5-2ubuntu1
released
eoan
Fixed 3.6.5-2ubuntu1
released
focal
Fixed 3.6.5-2ubuntu1
released
groovy
Fixed 3.6.5-2ubuntu1
released
hirsute
Fixed 3.6.5-2ubuntu1
released
impish
Fixed 3.6.5-2ubuntu1
released
jammy
Fixed 3.6.5-2ubuntu1
released
kinetic
Fixed 3.6.5-2ubuntu1
released
lunar
Fixed 3.6.5-2ubuntu1
released
trusty
dne
xenial
ignored