CVE-2019-13627
libgcrypt: ECDSA timing attack allowing private key leak
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.
Se detectó que había un ataque de sincronización ECDSA en la biblioteca criptográfica libgcrypt20. Versión afectada: 1.8.4-5, 1.7.6-2+deb9u3 y 1.6.3-2+deb8u4. Versiones corregidas: 1.8.5-2 y 1.6.3-2+deb8u7.
A timing attack was found in the way ECCDSA was implemented in libgcrypt. A man-in-the-middle attacker could use this attack during signature generation to recover the private key. This attack is only feasible when the attacker is local to the machine where the signature is being generated. Attacks over the network or via the internet are not feasible.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-07-17 CVE Reserved
- 2019-09-25 CVE Published
- 2024-08-04 CVE Updated
- 2024-09-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-203: Observable Discrepancy
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/10/02/2 | Mailing List | |
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html | Mailing List | |
https://minerva.crocs.fi.muni.cz | Third Party Advisory | |
https://security-tracker.debian.org/tracker/CVE-2019-13627 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html | 2021-07-21 | |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html | 2021-07-21 | |
https://security.gentoo.org/glsa/202003-32 | 2021-07-21 | |
https://usn.ubuntu.com/4236-1 | 2021-07-21 | |
https://usn.ubuntu.com/4236-2 | 2021-07-21 | |
https://usn.ubuntu.com/4236-3 | 2021-07-21 | |
https://access.redhat.com/security/cve/CVE-2019-13627 | 2020-11-04 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1764018 | 2020-11-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Libgcrypt20 Project Search vendor "Libgcrypt20 Project" | Libgcrypt20 Search vendor "Libgcrypt20 Project" for product "Libgcrypt20" | 1.6.3-2\+deb8u4 Search vendor "Libgcrypt20 Project" for product "Libgcrypt20" and version "1.6.3-2\+deb8u4" | - |
Affected
| in | Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Safe
|
Libgcrypt20 Project Search vendor "Libgcrypt20 Project" | Libgcrypt20 Search vendor "Libgcrypt20 Project" for product "Libgcrypt20" | 1.7.6-2\+deb9u3 Search vendor "Libgcrypt20 Project" for product "Libgcrypt20" and version "1.7.6-2\+deb9u3" | - |
Affected
| in | Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Safe
|
Libgcrypt20 Project Search vendor "Libgcrypt20 Project" | Libgcrypt20 Search vendor "Libgcrypt20 Project" for product "Libgcrypt20" | 1.8.4-5 Search vendor "Libgcrypt20 Project" for product "Libgcrypt20" and version "1.8.4-5" | - |
Affected
| in | Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Safe
|
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 19.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "19.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 19.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "19.10" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.0 Search vendor "Opensuse" for product "Leap" and version "15.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.1 Search vendor "Opensuse" for product "Leap" and version "15.1" | - |
Affected
|