gnu gnutls CVE-2018-16868 is a vulnerability in Gnutls
Published on December 3, 2018

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

Vendor Advisory Vendor Advisory NVD

Weakness Type

What is a Side Channel Attack Vulnerability?

The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not. Discrepancies can take many forms, and variations may be detectable in timing, control flow, communications such as replies or requests, or general behavior. These discrepancies can reveal information about the product's operation or internal state to an unauthorized actor. In some cases, discrepancies can be used by attackers to form a side channel.

CVE-2018-16868 has been classified to as a Side Channel Attack vulnerability or weakness.


Products Associated with CVE-2018-16868

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2018-16868 are published in Gnutls:

 

Affected Versions

[UNKNOWN] gnutls Version n/a is affected by CVE-2018-16868

Exploit Probability

EPSS
0.04%
Percentile
12.70%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.