Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.
References
Link | Resource |
---|---|
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html | Patch Release Notes Vendor Advisory |
http://www.debian.org/security/2015/dsa-3185 | Third Party Advisory |
http://www.cs.tau.ac.il/~tromer/radioexp/ | Third Party Advisory |
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html | Patch Vendor Advisory |
http://www.debian.org/security/2015/dsa-3184 | Third Party Advisory |
Information
Published : 2019-11-29 14:15
Updated : 2019-12-05 10:06
NVD link : CVE-2014-3591
Mitre link : CVE-2014-3591
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
debian
- debian_linux
gnupg
- libgcrypt
- gnupg