CVE-2024-2236
- EPSS 0.22%
- Veröffentlicht 06.03.2024 22:15:57
- Zuletzt bearbeitet 02.04.2025 17:15:37
A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.
CVE-2021-40528
- EPSS 0.1%
- Veröffentlicht 06.09.2021 19:15:07
- Zuletzt bearbeitet 09.06.2025 16:15:33
The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined b...
CVE-2021-33560
- EPSS 0.63%
- Veröffentlicht 08.06.2021 11:15:07
- Zuletzt bearbeitet 21.11.2024 06:09:05
Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGam...
CVE-2021-3345
- EPSS 5.71%
- Veröffentlicht 29.01.2021 15:15:13
- Zuletzt bearbeitet 21.11.2024 06:21:20
_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.
CVE-2014-3591
- EPSS 0.14%
- Veröffentlicht 29.11.2019 22:15:11
- Zuletzt bearbeitet 21.11.2024 02:08:27
Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluct...
CVE-2015-0837
- EPSS 0.55%
- Veröffentlicht 29.11.2019 22:15:11
- Zuletzt bearbeitet 21.11.2024 02:23:49
The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cach...
CVE-2019-12904
- EPSS 0.29%
- Veröffentlicht 20.06.2019 00:15:10
- Zuletzt bearbeitet 21.11.2024 04:23:48
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation ...
CVE-2017-7526
- EPSS 2.7%
- Veröffentlicht 26.07.2018 13:29:00
- Zuletzt bearbeitet 21.11.2024 03:32:05
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 w...
CVE-2018-0495
- EPSS 0.23%
- Veröffentlicht 13.06.2018 23:29:00
- Zuletzt bearbeitet 21.11.2024 03:38:21
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka ...
CVE-2018-6829
- EPSS 0.53%
- Veröffentlicht 07.02.2018 23:29:01
- Zuletzt bearbeitet 21.11.2024 04:11:15
cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of...