Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-7526

Опубликовано: 29 июн. 2017
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.

Отчет

This side-channel attack requires that the attacker can run arbitrary software on the hardware where the private RSA key is used. Allowing execute access to a box with private keys should be considered as an unsafe security practice, anyway. Thus in practice there are easier ways to access the private keys than to mount this side-channel attack. However, on boxes with virtual machines this attack may be used by one VM to steal private keys from another VM.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5libgcryptWill not fix
Red Hat Enterprise Linux 6libgcryptWill not fix
Red Hat Enterprise Linux 7libgcryptWill not fix
Red Hat Enterprise Virtualization 3mingw-virt-viewerWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1466265libgcrypt: Use of left-to-right sliding window method allows full RSA key recovery

EPSS

Процентиль: 86%
0.02701
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 7 лет назад

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.

CVSS3: 6.1
nvd
больше 7 лет назад

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.

CVSS3: 6.1
debian
больше 7 лет назад

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel a ...

suse-cvrf
больше 8 лет назад

Security update for libgcrypt

suse-cvrf
больше 8 лет назад

Security update for compat-libgcrypt11

EPSS

Процентиль: 86%
0.02701
Низкий

6.1 Medium

CVSS3