A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
Version | Score | Severity | Vector String |
---|---|---|---|
3.0 | 4.7 | Medium | CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N |
Product | Vendor | Version |
---|---|---|
nettle | [UNKNOWN] | 10.3(1) |