4.3
CVSSv2

CVE-2017-9526

Published: 11/06/2017 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

In Libgcrypt prior to 1.7.7, an attacker who learns the EdDSA session key (from side-channel observation during the signing process) can easily recover the long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this session key in secure memory, to ensure that constant-time point operations are used in the MPI library.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnupg libgcrypt

Vendor Advisories

Several security issues were fixed in Libgcrypt ...
It was discovered that a side channel attack in the EdDSA session key handling in Libgcrypt may result in information disclosure For the stable distribution (jessie), this problem has been fixed in version 163-2+deb8u3 For the upcoming stable distribution (stretch), this problem has been fixed in version 176-2 For the unstable distribution ( ...