CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
54.9%
Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576.
Vendor | Product | Version | CPE |
---|---|---|---|
gnupg | libgcrypt | * | cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:* |
gnupg | libgcrypt | 1.4.0 | cpe:2.3:a:gnupg:libgcrypt:1.4.0:*:*:*:*:*:*:* |
gnupg | libgcrypt | 1.4.3 | cpe:2.3:a:gnupg:libgcrypt:1.4.3:*:*:*:*:*:*:* |
gnupg | libgcrypt | 1.4.4 | cpe:2.3:a:gnupg:libgcrypt:1.4.4:*:*:*:*:*:*:* |
gnupg | libgcrypt | 1.4.5 | cpe:2.3:a:gnupg:libgcrypt:1.4.5:*:*:*:*:*:*:* |
gnupg | libgcrypt | 1.4.6 | cpe:2.3:a:gnupg:libgcrypt:1.4.6:*:*:*:*:*:*:* |
gnupg | libgcrypt | 1.5.0 | cpe:2.3:a:gnupg:libgcrypt:1.5.0:*:*:*:*:*:*:* |
gnupg | libgcrypt | 1.5.1 | cpe:2.3:a:gnupg:libgcrypt:1.5.1:*:*:*:*:*:*:* |
gnupg | libgcrypt | 1.5.2 | cpe:2.3:a:gnupg:libgcrypt:1.5.2:*:*:*:*:*:*:* |
debian | debian_linux | 7.0 | cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* |