{"id":"CVE-2018-16869","details":"A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.","modified":"2026-04-16T00:04:14.381334449Z","published":"2018-12-03T14:29:00.380Z","related":["SUSE-SU-2018:4193-1","openSUSE-SU-2024:10962-1"],"references":[{"type":"ADVISORY","url":"http://cat.eyalro.net/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106092"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.4"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-16869.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N"}]}