Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7526

Опубликовано: 26 июл. 2018
Источник: debian

Описание

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libgcrypt20fixed1.7.8-1package
libgcrypt11removedpackage
gnupg2not-affectedpackage
gnupg1fixed1.4.22-1package
gnupg1no-dsastretchpackage
gnupgremovedpackage

Примечания

  • https://eprint.iacr.org/2017/627

  • Fixes for RSA exponent blinding fixes (A):

  • https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=a9f612def801c8145d551d995475e5d51a4c988c

  • https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=aff5fd0f2650e24cf99efcd7b499627ea48782c3

  • https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=312101e1f266314b4391fcdbe11c03de5c147e38

  • Fixes for mpi_powm itsef (B):

  • https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=0e6788517eac6f508fa32ec5d5c1cada7fb980bc

  • https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=fbd10abc057453789017f11c7f1fc8e6c61b79a3

  • For the particular attack to RSA, either (A) or (B) is enough. In

  • general cases, (A) plus (B) is needed.

  • For GnuPG: https://lists.gnupg.org/pipermail/gnupg-users/2017-July/058598.html

  • GnuPG: https://dev.gnupg.org/rC8725c99ffa41778f382ca97233183bcd687bb0ce

  • GnuPG1: https://dev.gnupg.org/D438

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 7 лет назад

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.

CVSS3: 6.1
redhat
больше 8 лет назад

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.

CVSS3: 6.1
nvd
больше 7 лет назад

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.

suse-cvrf
больше 8 лет назад

Security update for libgcrypt

suse-cvrf
больше 8 лет назад

Security update for compat-libgcrypt11