First published: Fri Nov 29 2019(Updated: )
Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gnupg Gnupg | <1.4.19 | |
GnuPG Libgcrypt | <1.6.3 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2014-3591.
CVE-2014-3591 has a severity rating of 4.2 (medium).
The affected software products are Libgcrypt before 1.6.3, GnuPG before 1.4.19, and Debian Linux 7.0 and 8.0.
The impact of CVE-2014-3591 is that physically proximate attackers can obtain the server's private key.
To mitigate CVE-2014-3591, you should update to Libgcrypt version 1.6.3 or later, GnuPG version 1.4.19 or later, or the fixed version of Debian Linux.