Page 2 of 13 results (0.010 seconds)

CVSS: 6.8EPSS: 0%CPEs: 6EXPL: 0

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used. libgcrypt en versiones anteriores a la 1.7.8 es vulnerable a un ataque de canal lateral de memoria caché, resultando en una brecha completa de RSA-1024 cuando se utiliza un método left-to-right para procesar la expansión de la ventana deslizante. Se cree que el mismo ataque funciona en RSA-2048 con un nivel de procesamiento moderadamente mayor. Este canal lateral necesita que el atacante pueda ejecutar software arbitrario en el hardware en donde se utiliza la clave privada RSA. • http://www.securityfocus.com/bid/99338 http://www.securitytracker.com/id/1038915 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526 https://eprint.iacr.org/2017/627 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=78130828e9a140a9de4dafadbc844dbb64cb709a https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=8725c99ffa41778f382ca97233183bcd687bb0ce https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=e6a3dc9900433bbc8ad362a595a3837318c28fa9 https: • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-310: Cryptographic Issues •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

In Libgcrypt before 1.7.7, an attacker who learns the EdDSA session key (from side-channel observation during the signing process) can easily recover the long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this session key in secure memory, to ensure that constant-time point operations are used in the MPI library. En Libgcrypt, anterior a versión 1.7.7, un atacante que aprende la clave de sesión EdDSA (de la observación del canal lateral durante el proceso de firma) puede fácilmente recuperar la clave secreta a largo plazo . 1.7.7 haciendo un cambio del archivo cipher/ecc-eddsa.c para almacenar esta clave de sesión en memoria segura, y así garantizar que operaciones puntuales de tiempo constante sean usadas en la biblioteca MPI. • http://www.debian.org/security/2017/dsa-3880 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/99046 https://bugzilla.suse.com/show_bug.cgi?id=1042326 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=5a22de904a0a366ae79f03ff1e13a1232a89e26b https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=f9494b3f258e01b6af8bd3941ce436bcc00afc56 https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.3EPSS: 0%CPEs: 15EXPL: 0

The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits. Las funciones de mezcla en el generador de números aleatorios en Libgcrypt en versiones anteriores a 1.5.6, 1.6.x en versiones anteriores a 1.6.6 y 1.7.x en versiones anteriores a 1.7.3 y GnuPG en versiones anteriores a 1.4.21 hacen más fácil para atacantes obtener valores de 160 bits aprovechando el conocimiento de los 4640 bits previos. A design flaw was found in the libgcrypt PRNG (Pseudo-Random Number Generator). An attacker able to obtain the first 580 bytes of the PRNG output could predict the following 20 bytes. • http://rhn.redhat.com/errata/RHSA-2016-2674.html http://www.debian.org/security/2016/dsa-3649 http://www.debian.org/security/2016/dsa-3650 http://www.securityfocus.com/bid/92527 http://www.securitytracker.com/id/1036635 http://www.ubuntu.com/usn/USN-3064-1 http://www.ubuntu.com/usn/USN-3065-1 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=blob_plain%3Bf=NEWS https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html https://securit • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 2.0EPSS: 0%CPEs: 6EXPL: 0

Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations. Libgcrypt en versiones anteriores a 1.6.5 no lleva a cabo correctamente la multiplicación de curva de puntos elípticos durante el descifrado, lo que facilita a atacantes físicamente próximos extrarer claves ECDH mediante la lectura de las emanaciones electromagnéticas. • http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html http://www.cs.tau.ac.IL/~tromer/ecdh http://www.debian.org/security/2016/dsa-3474 http://www.debian.org/security/2016/dsa-3478 http://www.securityfocus.com/bid/83253 http://www.ubuntu.com/usn/USN-2896-1 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html https://security.gentoo • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.2EPSS: 0%CPEs: 4EXPL: 0

Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication. Libgcrypt versiones anteriores a 1.6.3 y GnuPG versiones anteriores a 1.4.19, no implementa un blinding de texto cifrado para el desencriptado de Elgamal, lo que permite a atacantes físicamente próximos obtener la clave privada del servidor determinando factores que utilizan texto cifrado y las fluctuaciones en el campo electromagnético durante la multiplicación. • http://www.cs.tau.ac.il/~tromer/radioexp http://www.debian.org/security/2015/dsa-3184 http://www.debian.org/security/2015/dsa-3185 https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •