GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-4576 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 2.9 |
---|---|
Base Metrics | AV:A/AC:M/Au:N/C:P/I:N/A:N |
Access Vector | Adjacent Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 5 (gnupg) | RHSA-2014:0016 | 2014-01-08 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | libgcrypt | Not affected |
Red Hat Enterprise Linux 6 | libgcrypt | Not affected |
Red Hat Enterprise Linux 5 | libgcrypt | Not affected |