CVE Vulnerabilities

CVE-2016-7056

Covert Timing Channel

Published: Sep 10, 2018 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.

Weakness

Covert timing channels convey information by modulating some aspect of system behavior over time, so that the program receiving the information can observe system behavior and infer protected information.

Affected Software

NameVendorStart VersionEnd Version
OpensslOpenssl*1.0.1u (including)
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7*
Red Hat Enterprise Linux 7RedHatopenssl-1:1.0.2k-8.el7*
Red Hat JBoss Web Server 3.1RedHat*
Red Hat JBoss Web Server 3 for RHEL 6RedHatlog4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6*
Red Hat JBoss Web Server 3 for RHEL 6RedHattomcat7-0:7.0.70-22.ep7.el6*
Red Hat JBoss Web Server 3 for RHEL 6RedHattomcat8-0:8.0.36-24.ep7.el6*
Red Hat JBoss Web Server 3 for RHEL 6RedHattomcat-native-0:1.2.8-10.redhat_10.ep7.el6*
Red Hat JBoss Web Server 3 for RHEL 7RedHatlog4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7*
Red Hat JBoss Web Server 3 for RHEL 7RedHattomcat7-0:7.0.70-22.ep7.el7*
Red Hat JBoss Web Server 3 for RHEL 7RedHattomcat8-0:8.0.36-24.ep7.el7*
Red Hat JBoss Web Server 3 for RHEL 7RedHattomcat-native-0:1.2.8-10.redhat_10.ep7.el7*
Text-Only JBCSRedHat*
OpensslUbuntuesm-infra-legacy/trusty*
OpensslUbuntuprecise*
OpensslUbuntutrusty*
OpensslUbuntutrusty/esm*
OpensslUbuntuvivid/stable-phone-overlay*
OpensslUbuntuvivid/ubuntu-core*
Openssl098Ubuntuprecise*
Openssl098Ubuntutrusty*

Extended Description

In some instances, knowing when data is transmitted between parties can provide a malicious user with privileged information. Also, externally monitoring the timing of operations can potentially reveal sensitive data. For example, a cryptographic operation can expose its internal state if the time it takes to perform the operation varies, based on the state. Covert channels are frequently classified as either storage or timing channels. Some examples of covert timing channels are the system’s paging rate, the time a certain transaction requires to execute, and the time it takes to gain access to a shared bus.

Potential Mitigations

References