Lucene search

K
archlinuxArchLinuxASA-202101-45
HistoryJan 29, 2021 - 12:00 a.m.

[ASA-202101-45] libgcrypt: arbitrary code execution

2021-01-2900:00:00
security.archlinux.org
100

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

55.2%

Arch Linux Security Advisory ASA-202101-45

Severity: Critical
Date : 2021-01-29
CVE-ID : CVE-2021-3345
Package : libgcrypt
Type : arbitrary code execution
Remote : No
Link : https://security.archlinux.org/AVG-1505

Summary

The package libgcrypt before version 1.9.1-1 is vulnerable to arbitrary
code execution.

Resolution

Upgrade to 1.9.1-1.

pacman -Syu “libgcrypt>=1.9.1-1”

The problem has been fixed upstream in version 1.9.1.

Workaround

None.

Description

_gcry_md_block_write in cipher/hash-common.c in libgcrypt version 1.9.0
has a heap-based buffer overflow when the digest final function sets a
large count value. Just decrypting some data can overflow a heap buffer
with attacker controlled data, no verification or signature is
validated before the vulnerability occurs. The issue is fixed in
version 1.9.1.

Impact

An attacker is able to execute arbitrary code on the affected host
before a given signature has been verified.

References

https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.html
https://dev.gnupg.org/T5275
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=512c0c75276949f13b6373b5c04f7065af750b08
https://security.archlinux.org/CVE-2021-3345

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanylibgcrypt< 1.9.1-1UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

55.2%