CVE-2018-6829
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
cipher/elgamal.c en Libgcrypt hasta la versión 1.8.2, al emplearse para cifrar mensajes directamente, cifra los textos planos indebidamente, lo que permite que atacantes remotos obtengan información sensible mediante la lectura de datos en texto cifrado (p.ej., no tiene seguridad semántica a la hora de enfrentarse a un ataque solo en texto cifrado). La hipótesis DDH (Decisional Diffie-Hellman) no soporta la implementación ElGamal de Libgcrypt.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-02-07 CVE Reserved
- 2018-02-07 CVE Published
- 2023-07-01 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/weikengchen/attack-on-libgcrypt-elgamal | Third Party Advisory | |
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html | Issue Tracking | |
https://www.oracle.com/security-alerts/cpujan2020.html | X_refsource_misc |
URL | Date | SRC |
---|---|---|
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|