First published: Fri Dec 20 2013(Updated: )
GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GnuPG | <=1.4.15 | |
Debian GnuPG | =1.0.0 | |
Debian GnuPG | =1.0.1 | |
Debian GnuPG | =1.0.2 | |
Debian GnuPG | =1.0.3 | |
Debian GnuPG | =1.0.4 | |
Debian GnuPG | =1.0.4 | |
Debian GnuPG | =1.0.5 | |
Debian GnuPG | =1.0.5 | |
Debian GnuPG | =1.0.6 | |
Debian GnuPG | =1.0.7 | |
Debian GnuPG | =1.2.0 | |
Debian GnuPG | =1.2.1 | |
Debian GnuPG | =1.2.1-windows | |
Debian GnuPG | =1.2.2 | |
Debian GnuPG | =1.2.3 | |
Debian GnuPG | =1.2.4 | |
Debian GnuPG | =1.2.5 | |
Debian GnuPG | =1.2.6 | |
Debian GnuPG | =1.2.7 | |
Debian GnuPG | =1.3.0 | |
Debian GnuPG | =1.3.1 | |
Debian GnuPG | =1.3.2 | |
Debian GnuPG | =1.3.3 | |
Debian GnuPG | =1.3.4 | |
Debian GnuPG | =1.3.6 | |
Debian GnuPG | =1.3.90 | |
Debian GnuPG | =1.3.91 | |
Debian GnuPG | =1.3.92 | |
Debian GnuPG | =1.3.93 | |
Debian GnuPG | =1.4 | |
Debian GnuPG | =1.4.0 | |
Debian GnuPG | =1.4.2 | |
Debian GnuPG | =1.4.3 | |
Debian GnuPG | =1.4.4 | |
Debian GnuPG | =1.4.5 | |
Debian GnuPG | =1.4.6 | |
Debian GnuPG | =1.4.8 | |
Debian GnuPG | =1.4.10 | |
Debian GnuPG | =1.4.11 | |
Debian GnuPG | =1.4.12 | |
Debian GnuPG | =1.4.13 | |
Debian GnuPG | =1.4.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4576 has a medium severity rating due to the possibility of RSA key extraction via a chosen-ciphertext attack.
To fix CVE-2013-4576, update GnuPG to version 1.4.16 or later.
CVE-2013-4576 affects all versions of GnuPG 1.x prior to 1.4.16.
CVE-2013-4576 is associated with a chosen-ciphertext attack allowing key extraction.
Users of GnuPG could have their RSA keys compromised if they are vulnerable to physical attacks in proximity to the device during decryption.