First published: Wed Feb 07 2018(Updated: )
cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GnuPG Libgcrypt | <=1.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-6829.
CVE-2018-6829 has a severity level of high (7.5).
CVE-2018-6829 allows attackers to obtain sensitive information by reading ciphertext data.
To fix CVE-2018-6829, you should update Libgcrypt to version 1.8.3 or later.
You can find more information about CVE-2018-6829 at the following references: [1] [2] [3]