Memory-cache side-channel attack in libgcrypt (Alpine package)



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-0495
CWE-ID CWE-200
Exploitation vector Local
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
libgcrypt (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Memory-cache side-channel attack

EUVDB-ID: #VU13370

Risk: Low

CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2018-0495

CWE-ID: CWE-200 - Information exposure

Exploit availability: Yes

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to a leakage of information through memory caches when the affected library uses a private key to create Elliptic Curve Digital Signature Algorithm (ECDSA) signatures.  A local attacker can conduct a memory-cache side-channel attack on ECDSA signatures and recover sensitive information, such as ECDSA private keys, which could be used to conduct further attacks. 

Note: The vulnerability is known as the "Return Of the Hidden Number Problem" or ROHNP.

Mitigation

Install update from vendor's website.

Vulnerable software versions

libgcrypt (Alpine package): 1.7.9-r0

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=237b184ab920ac272b958d7e5cfab67112bd00b7
https://git.alpinelinux.org/aports/commit/?id=5b4846da350aac758d8d91420167fd99e33bcdea
https://git.alpinelinux.org/aports/commit/?id=92381611d07c877dd1469e1f2f6cf5dd45b11730
https://git.alpinelinux.org/aports/commit/?id=25760a2a94cd003c6ae42b72c4701f96d4264027
https://git.alpinelinux.org/aports/commit/?id=a8d906fd888391043f72226d80ddaf247ef4ad9f
https://git.alpinelinux.org/aports/commit/?id=958b1aff2dc3a82a58d3dc52ded6988c0658547b
https://git.alpinelinux.org/aports/commit/?id=e0dc3d5bbfc8733822bc0291577475a768d84495
https://git.alpinelinux.org/aports/commit/?id=d59577c011626963a91f59d8cce9c55e72baf023
https://git.alpinelinux.org/aports/commit/?id=64003a818c75a368244e5123801eeae2c9289406


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###