Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-40528

Опубликовано: 06 сент. 2021
Источник: debian
EPSS Низкий

Описание

The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libgcrypt20fixed1.8.7-6package
libgcrypt20fixed1.8.4-5+deb10u1busterpackage

Примечания

  • https://dev.gnupg.org/T5328

  • https://eprint.iacr.org/2021/923.pdf

  • https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320 (1.9.x)

  • https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=707c3c5c511ee70ad0e39ec613471f665305fbea (1.8.x)

  • See notes on CVE-2021-40528 on the confusion about swapping of scope of

  • CVE-2021-40528 and CVE-2021-33560.

EPSS

Процентиль: 23%
0.00072
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 4 года назад

The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.

CVSS3: 5.9
redhat
около 4 лет назад

The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.

CVSS3: 5.9
nvd
почти 4 года назад

The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.

CVSS3: 5.9
msrc
почти 4 года назад

Описание отсутствует

redos
больше 3 лет назад

Уязвимость криптографической библиотеки Libgcrypt

EPSS

Процентиль: 23%
0.00072
Низкий