Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2018-0737

Description

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

POC

Reference

- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

- https://usn.ubuntu.com/3628-1/

- https://usn.ubuntu.com/3692-1/

- https://usn.ubuntu.com/3692-2/

- https://www.oracle.com//security-alerts/cpujul2021.html

- https://www.oracle.com/security-alerts/cpuapr2020.html

- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

- https://www.tenable.com/security/tns-2018-17

Github

- https://github.com/ARPSyndicate/cvemon

- https://github.com/JeffroMF/sslpatch

- https://github.com/MrE-Fog/sslpatch

- https://github.com/S8Cloud/sslpatch

- https://github.com/chnzzh/OpenSSL-CVE-lib

- https://github.com/hannob/tls-what-can-go-wrong

- https://github.com/javirodriguezzz/Shodan-Browser

- https://github.com/mrodden/vyger

- https://github.com/tlsresearch/TSI