CVE-2018-10846 vulnerability in GNU and Other Products
Published on August 22, 2018
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
Weakness Type
Covert Timing Channel
Covert timing channels convey information by modulating some aspect of system behavior over time, so that the program receiving the information can observe system behavior and infer protected information.
Products Associated with CVE-2018-10846
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2018-10846 are published in these products:
Affected Versions
[UNKNOWN] gnutls Version n/a is affected by CVE-2018-10846Exploit Probability
EPSS
0.01%
Percentile
2.37%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.