Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-6313

Опубликовано: 17 авг. 2016
Источник: redhat
CVSS3: 4.8
CVSS2: 4
EPSS Низкий

Описание

The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.

A design flaw was found in the libgcrypt PRNG (Pseudo-Random Number Generator). An attacker able to obtain the first 580 bytes of the PRNG output could predict the following 20 bytes.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5libgcryptWill not fix
Red Hat Enterprise Linux 6libgcryptFixedRHSA-2016:267408.11.2016
Red Hat Enterprise Linux 7libgcryptFixedRHSA-2016:267408.11.2016

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1366105libgcrypt: PRNG output is predictable

EPSS

Процентиль: 88%
0.04101
Низкий

4.8 Medium

CVSS3

4 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 9 лет назад

The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.

CVSS3: 5.3
nvd
почти 9 лет назад

The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.

CVSS3: 5.3
debian
почти 9 лет назад

The mixing functions in the random number generator in Libgcrypt befor ...

suse-cvrf
около 9 лет назад

Security update for libgcrypt

suse-cvrf
около 9 лет назад

Security update for libgcrypt

EPSS

Процентиль: 88%
0.04101
Низкий

4.8 Medium

CVSS3

4 Medium

CVSS2