CVE-2018-0734
Severity
5.9MEDIUM
EPSS
6.1%
top 9.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 30
Latest updateMay 13
Description
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6
Affected Packages14 packages
▶CVEListV5openssl/opensslFixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p), Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i), Fixed in OpenSSL 1.1.1a (Affected 1.1.1)+2
Also affects: Debian Linux 9.0, Ubuntu Linux 14.04, 16.04, 18.04, 18.10
Patches
🔴Vulnerability Details
4📋Vendor Advisories
5💬Community
4Bugzilla▶
CVE-2018-0734 openssl: timing side channel attack in the DSA signature algorithm [fedora-all]↗2018-10-30
Bugzilla
▶
Bugzilla▶
CVE-2018-0734 mingw-openssl: openssl: timing side channel attack in the DSA signature algorithm [epel-7]↗2018-10-30
Bugzilla▶
CVE-2018-0734 mingw-openssl: openssl: timing side channel attack in the DSA signature algorithm [fedora-all]↗2018-10-30