First published: Fri Nov 29 2019(Updated: )
The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnupg Gnupg | <1.4.19 | |
GnuPG Libgcrypt | <1.6.3 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0837 is a vulnerability in Libgcrypt and GnuPG that allows attackers to obtain sensitive information through a timing-based side-channel attack.
CVE-2015-0837 leverages timing differences when accessing a pre-computed table during modular exponentiation, allowing attackers to obtain sensitive information.
GnuPG versions up to and excluding 1.4.19 and Libgcrypt versions up to and excluding 1.6.3 are affected by CVE-2015-0837.
CVE-2015-0837 has a severity rating of 5.9, which is considered medium.
To fix CVE-2015-0837, users should update to GnuPG version 1.4.19 or newer and Libgcrypt version 1.6.3 or newer.