CVE-2018-0737

Impact:
Low
Public Date:
2018-04-16
CWE:
CWE-385
Bugzilla:
1568253: CVE-2018-0737 openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys
OpenSSL RSA key generation was found to be vulnerable to cache side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover parts of the private key.

Find out more about CVE-2018-0737 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 3.3
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
Attack Vector Local
Attack Complexity High
Privileges Required Low
User Interaction Required
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact None

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (openssl) RHSA-2018:3221 2018-10-30

Affected Packages State

Platform Package State
Red Hat JBoss Web Server 3 openssl Affected
Red Hat JBoss EWS 2 openssl Will not fix
Red Hat JBoss EAP 6 openssl Will not fix
Red Hat JBoss EAP 5 openssl Will not fix
Red Hat JBoss Core Services 1 openssl Affected
Red Hat Enterprise Linux 7 openssl098e Will not fix
Red Hat Enterprise Linux 7 OVMF Under investigation
Red Hat Enterprise Linux 6 openssl Affected
Red Hat Enterprise Linux 6 openssl098e Will not fix
Red Hat Enterprise Linux 5 openssl Will not fix
Red Hat Enterprise Linux 5 openssl097a Will not fix

External References

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.