2.1
CVSSv2

CVE-2013-4576

Published: 20/12/2013 Updated: 29/08/2017
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

GnuPG 1.x prior to 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate malicious users to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE.

Vulnerable Product Search on Vulmon Subscribe to Product

gnupg gnupg 1.0.4

gnupg gnupg 1.0.5

gnupg gnupg 1.2.2

gnupg gnupg 1.2.3

gnupg gnupg 1.3.2

gnupg gnupg 1.3.3

gnupg gnupg 1.3.4

gnupg gnupg 1.4.0

gnupg gnupg 1.4.10

gnupg gnupg 1.4.4

gnupg gnupg 1.4.5

gnupg gnupg

gnupg gnupg 1.0.0

gnupg gnupg 1.0.6

gnupg gnupg 1.2.4

gnupg gnupg 1.2.5

gnupg gnupg 1.3.6

gnupg gnupg 1.3.90

gnupg gnupg 1.4.11

gnupg gnupg 1.4.12

gnupg gnupg 1.4.6

gnupg gnupg 1.4.8

gnupg gnupg 1.0.3

gnupg gnupg 1.2.1

gnupg gnupg 1.3.0

gnupg gnupg 1.3.1

gnupg gnupg 1.3.93

gnupg gnupg 1.4

gnupg gnupg 1.4.2

gnupg gnupg 1.4.3

gnupg gnupg 1.0.1

gnupg gnupg 1.0.2

gnupg gnupg 1.0.7

gnupg gnupg 1.2.0

gnupg gnupg 1.2.6

gnupg gnupg 1.2.7

gnupg gnupg 1.3.91

gnupg gnupg 1.3.92

gnupg gnupg 1.4.13

gnupg gnupg 1.4.14

Vendor Advisories

Synopsis Moderate: gnupg security update Type/Severity Security Advisory: Moderate Topic An updated gnupg package that fixes one security issue is now available forRed Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact A Common Vulnerability Sc ...
GnuPG could expose sensitive information when performing decryption ...
Genkin, Shamir and Tromer discovered that RSA key material could be extracted by using the sound generated by the computer during the decryption of some chosen ciphertexts For the oldstable distribution (squeeze), this problem has been fixed in version 1410-4+squeeze4 For the stable distribution (wheezy), this problem has been fixed in version ...
GnuPG 1x before 1416 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption NOTE: applications are not typically expected to protect themselves from acousti ...
GnuPG 1x before 1416 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption NOTE: applications are not typically expected to protect themselves from acousti ...