ID CVE-2016-6489
Summary The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.
References
Vulnerable Configurations
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*
  • cpe:2.3:a:nettle_project:nettle:-:*:*:*:*:*:*:*
    cpe:2.3:a:nettle_project:nettle:-:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 01-07-2017 - 01:30)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
redhat via4
advisories
bugzilla
id 1362016
title CVE-2016-6489 nettle: RSA/DSA code is vulnerable to cache-timing related attacks
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 7 Client is installed
      oval oval:com.redhat.rhba:tst:20150364001
    • comment Red Hat Enterprise Linux 7 Server is installed
      oval oval:com.redhat.rhba:tst:20150364002
    • comment Red Hat Enterprise Linux 7 Workstation is installed
      oval oval:com.redhat.rhba:tst:20150364003
    • comment Red Hat Enterprise Linux 7 ComputeNode is installed
      oval oval:com.redhat.rhba:tst:20150364004
  • OR
    • AND
      • comment nettle is earlier than 0:2.7.1-8.el7
        oval oval:com.redhat.rhsa:tst:20162582005
      • comment nettle is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20162582006
    • AND
      • comment nettle-devel is earlier than 0:2.7.1-8.el7
        oval oval:com.redhat.rhsa:tst:20162582007
      • comment nettle-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20162582008
rhsa
id RHSA-2016:2582
released 2016-11-03
severity Moderate
title RHSA-2016:2582: nettle security and bug fix update (Moderate)
rpms
  • nettle-0:2.7.1-8.el7
  • nettle-devel-0:2.7.1-8.el7
refmap via4
confirm
gentoo GLSA-201706-21
misc https://eprint.iacr.org/2016/596.pdf
mlist [oss-security] 20160729 Re: CVE Request: nettle's RSA code is vulnerable to cache sharing related attacks
ubuntu USN-3193-1
Last major update 01-07-2017 - 01:30
Published 14-04-2017 - 18:59
Back to Top