SB2018110501 - Lucky Thirteen Attack in GnuTLS implementation
Published: November 5, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2018-10844)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to usage of an insecure implementation of HMAC-SHA-256 algorithm vulnerable to a Lucky thirteen style attack. A remote attacker with ability to intercept traffic can recover encrypted data.
2) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2018-10845)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to usage of an insecure implementation of HMAC-SHA-384 algorithm vulnerable to a Lucky thirteen style attack. A remote attacker with ability to intercept traffic can recover encrypted data.
3) Cryptographic issues (CVE-ID: CVE-2018-10846)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a cache-based side channel in GnuTLS implementation that can lead to recovery of data in cross-VM attack setting. A remote attacker with ability to intercept traffic can recover encrypted data using a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack.
Remediation
Install update from vendor's website.
References
- http://www.securityfocus.com/bid/105138
- https://access.redhat.com/errata/RHSA-2018:3050
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10844
- https://eprint.iacr.org/2018/747
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10845
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10846