CVE-2018-16868

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.6 MEDIUM
PHYSICAL
HIGH
LOW
CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
redhatCNA
4.7 MEDIUM
PHYSICAL
HIGH
HIGH
CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 26%
VendorProductVersion
gnugnutls
𝑥
≤ 3.6.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gnutls28
bullseye
3.7.1-5+deb11u5
fixed
stretch
no-dsa
bullseye (security)
3.7.1-5+deb11u6
fixed
bookworm
3.7.9-2+deb12u3
fixed
sid
3.8.6-2
fixed
trixie
3.8.6-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gnutls26
lunar
dne
kinetic
dne
jammy
dne
impish
dne
hirsute
dne
groovy
dne
focal
dne
eoan
dne
disco
dne
cosmic
dne
bionic
dne
xenial
dne
trusty
ignored
gnutls28
lunar
Fixed 3.6.5-2ubuntu1
released
kinetic
Fixed 3.6.5-2ubuntu1
released
jammy
Fixed 3.6.5-2ubuntu1
released
impish
Fixed 3.6.5-2ubuntu1
released
hirsute
Fixed 3.6.5-2ubuntu1
released
groovy
Fixed 3.6.5-2ubuntu1
released
focal
Fixed 3.6.5-2ubuntu1
released
eoan
Fixed 3.6.5-2ubuntu1
released
disco
Fixed 3.6.5-2ubuntu1
released
cosmic
ignored
bionic
ignored
xenial
ignored
trusty
dne