CVE-2018-12435 (NVD)

2018-06-15

Botan 2.5.0 through 2.6.0 before 2.7.0 allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP, related to dsa/dsa.cpp, ec_group/ec_group.cpp, and ecdsa/ecdsa.cpp. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

Products Botan
Type Information Exposure (CWE-200)
First patch https://github.com/randombit/botan/commit/48fc8df51d99f9d8ba251219367b3d629cc848e3
Relevant file/s • ./doc/security.rst (modified, +8)
• ./src/lib/pubkey/dsa/dsa.cpp (modified, +28, -10)
• ./src/lib/pubkey/ec_group/ec_group.cpp (modified, +20)
• ./src/lib/pubkey/ec_group/ec_group.h (modified, +10)
• ./src/lib/pubkey/ecdsa/ecdsa.cpp (modified, +22, -7)
Links https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
https://botan.randombit.net/security.html

botan - Tree: 48fc8df51d

(? files)

Filter Settings
Files
Navigation
Patch data:

(on by default)


Patched area: