Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.
References
Link | Resource |
---|---|
http://www.cs.tau.ac.il/~tromer/radioexp/ | Third Party Advisory |
http://www.debian.org/security/2015/dsa-3184 | Third Party Advisory |
http://www.debian.org/security/2015/dsa-3185 | Third Party Advisory |
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html | Patch Release Notes Vendor Advisory |
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2019-11-29 22:15
Updated : 2019-12-05 18:06
NVD link : CVE-2014-3591
Mitre link : CVE-2014-3591
CVE.ORG link : CVE-2014-3591
JSON object : View
Products Affected
debian
- debian_linux
gnupg
- gnupg
- libgcrypt
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor