National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2018-0737 Detail

Description

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

Source:  MITRE
Description Last Modified:  04/16/2018

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://www.securityfocus.com/bid/103766
http://www.securitytracker.com/id/1040685
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787
https://usn.ubuntu.com/3628-1/
https://usn.ubuntu.com/3628-2/
https://www.openssl.org/news/secadv/20180416.txt

Technical Details

Vulnerability Type (View All)

Change History

2 change records found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2018-0737
NVD Published Date:
04/16/2018
NVD Last Modified:
04/20/2018