1.9
CVSSv2

CVE-2015-7511

Published: 19/04/2016 Updated: 07/11/2023
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 2 | Impact Score: 1.4 | Exploitability Score: 0.5
VMScore: 169
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Libgcrypt prior to 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate malicious users to extract ECDH keys by measuring electromagnetic emanations.

Vulnerable Product Search on Vulmon Subscribe to Product

gnupg libgcrypt

debian debian linux 8.0

debian debian linux 7.0

canonical ubuntu linux 12.04

canonical ubuntu linux 15.10

canonical ubuntu linux 14.04

Vendor Advisories

Libgcrypt could be made to expose sensitive information ...
Daniel Genkin, Lev Pachmanov, Itamar Pipman and Eran Tromer discovered that the ECDH secret decryption keys in applications using the libgcrypt11 library could be leaked via a side-channel attack See wwwcstauacIL/~tromer/ecdh/ for details For the oldstable distribution (wheezy), this problem has been fixed in version 150-5+deb7u4 W ...
Libgcrypt before 165 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations ...

Recent Articles

Stray electronic-magnetic leaks used to harvest PC crypto keys
The Register • John Leyden • 16 Feb 2016

TEMPESTuous

Israeli security researchers have been able to extract encryption keys from a nearby computer by analysing stray electromagnetic radiation. The attack by computer scientists from Tel Aviv University shows that TEMPEST-style side channel attacks are no longer just the preserve of Mission Impossible and three-letter spy agencies. In a paper, titled ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs, the researchers demonstrate how secret decryption keys in applications using the ...