Vulnerability Description
The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Gnutls | <= 3.0.10 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
- http://secunia.com/advisories/57260
- http://www.isg.rhul.ac.uk/~kp/dtls.pdf
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
- http://secunia.com/advisories/57260
- http://www.isg.rhul.ac.uk/~kp/dtls.pdf
FAQ
What is CVE-2012-0390?
CVE-2012-0390 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easi...
How severe is CVE-2012-0390?
CVE-2012-0390 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-0390?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Gnutls.