Botan 2.5.0 through 2.6.0 before 2.7.0 allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP, related to dsa/dsa.cpp, ec_group/ec_group.cpp, and ecdsa/ecdsa.cpp. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
References
Link | Resource |
---|---|
https://botan.randombit.net/security.html | Third Party Advisory |
https://github.com/randombit/botan/commit/48fc8df51d99f9d8ba251219367b3d629cc848e3 | Patch Third Party Advisory |
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-06-15 02:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-12435
Mitre link : CVE-2018-12435
CVE.ORG link : CVE-2018-12435
JSON object : View
Products Affected
botan_project
- botan
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor