Key Management Errors Affecting botan package, versions <2.9.0-r0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALPINE317-BOTAN-3139022
- published 8 Jan 2019
- disclosed 8 Mar 2019
Introduced: 8 Jan 2019
CVE-2018-20187 Open this link in a new tabHow to fix?
Upgrade Alpine:3.17
botan
to version 2.9.0-r0 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream botan
package and not the botan
package as distributed by Alpine
.
See How to fix?
for Alpine:3.17
relevant fixed versions and status.
A side-channel issue was discovered in Botan before 2.9.0. An attacker capable of precisely measuring the time taken for ECC key generation may be able to derive information about the high bits of the secret key, as the function to derive the public point from the secret scalar uses an unblinded Montgomery ladder whose loop iteration count depends on the bitlength of the secret. This issue affects only key generation, not ECDSA signatures or ECDH key agreement.
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20187
- https://security-tracker.debian.org/tracker/CVE-2018-20187
- https://botan.randombit.net/news.html
- https://botan.randombit.net/security.html
- https://github.com/crocs-muni/ECTester
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2018-20187