CVE-2018-12437

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-12437
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-12437.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-12437
Related
Published
2018-06-15T02:29:00Z
Modified
2025-02-14T10:23:09.331222Z
Severity
  • 4.9 (Medium) CVSS_V3 - CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

LibTomCrypt through 1.18.1 allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

References

Affected packages

Debian:11 / libtomcrypt

Package

Name
libtomcrypt
Purl
pkg:deb/debian/libtomcrypt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.18.2-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / libtomcrypt

Package

Name
libtomcrypt
Purl
pkg:deb/debian/libtomcrypt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.18.2-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / libtomcrypt

Package

Name
libtomcrypt
Purl
pkg:deb/debian/libtomcrypt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.18.2-1

Ecosystem specific

{
    "urgency": "low"
}

Git / github.com/libtom/libtomcrypt

Affected ranges

Type
GIT
Repo
https://github.com/libtom/libtomcrypt
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*

0.75
0.76
0.77
0.78
0.79
0.80
0.81
0.82
0.83
0.84
0.85
0.86
0.87
0.88
0.89
0.90
0.91
0.92
0.93
0.94
0.95
0.96
0.97
0.97a
0.97b
0.98
0.99

1.*

1.00
1.01
1.02
1.03
1.04
1.05
1.06
1.07
1.08
1.09
1.10
1.11
1.12
1.13
1.14
1.15
1.16
1.17

v1.*

v1.18.0
v1.18.0-rc1
v1.18.0-rc2
v1.18.0-rc3
v1.18.0-rc4
v1.18.0-rc5
v1.18.1