{"uuid": "8569f435-bcdf-41be-bd33-430b0aed19df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0174", "type": "published-proof-of-concept", "source": "https://t.me/thehackernews/338", "content": "RAMBleed Attack \u2013 Researchers demonstrated a new side-channel attack (CVE-2019-0174) to steal sensitive data from the device memory without actually accessing it.\n \nRAMBleed is based on a well-known class of DRAM Rowhammer attacks; but instead of writing, it allows attackers to read bits from the adjacent rows.\n \nResearchers demonstrated their finding with an attack against OpenSSH 7.9 and extracted an RSA-2048 key from the memory.\n \nRead more: https://thehackernews.com/2019/06/rambleed-dram-attack.html", "creation_timestamp": "2019-06-12T12:26:00.000000Z"}