The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
References
Link | Resource |
---|---|
https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 | Third Party Advisory |
https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2 | Exploit Third Party Advisory |
https://eprint.iacr.org/2021/923 | Technical Description Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HGVBZ2TTRKCTYAZTRHTF6OBD4W37F5MT/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57OJA2K5AHX5HAU2QBDRWLGIIUX7GASC/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJYOZGWI7TD27SEXILSM6VUTPPEICDL7/ | Mailing List Third Party Advisory |
Information
Published : 2021-09-06 12:15
Updated : 2021-10-18 04:58
NVD link : CVE-2021-40530
Mitre link : CVE-2021-40530
JSON object : View
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
Products Affected
cryptopp
- crypto\+\+
fedoraproject
- fedora