Botan 2.5.0 through 2.6.0 before 2.7.0 allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP, related to dsa/dsa.cpp, ec_group/ec_group.cpp, and ecdsa/ecdsa.cpp. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
References
Link | Resource |
---|---|
https://botan.randombit.net/security.html | Third Party Advisory |
https://github.com/randombit/botan/commit/48fc8df51d99f9d8ba251219367b3d629cc848e3 | Patch Third Party Advisory |
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-06-15T02:00:00
Updated: 2018-07-07T21:57:01
Reserved: 2018-06-14T00:00:00
Link: CVE-2018-12435
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-06-15T02:29:00.377
Modified: 2018-08-22T19:57:41.990
Link: CVE-2018-12435
JSON object: View
Redhat Information
No data.
CWE