Key Management Errors Affecting botan package, versions <2.9.0-2


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.12% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-BOTAN-268767
  • published8 Jan 2019
  • disclosed8 Mar 2019

Introduced: 8 Jan 2019

CVE-2018-20187  (opens in a new tab)
CWE-320  (opens in a new tab)

How to fix?

Upgrade Debian:10 botan to version 2.9.0-2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream botan package and not the botan package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

A side-channel issue was discovered in Botan before 2.9.0. An attacker capable of precisely measuring the time taken for ECC key generation may be able to derive information about the high bits of the secret key, as the function to derive the public point from the secret scalar uses an unblinded Montgomery ladder whose loop iteration count depends on the bitlength of the secret. This issue affects only key generation, not ECDSA signatures or ECDH key agreement.