5.8 Medium
AI Score
Confidence
High
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
39.7%
Daniel Genkin, Adi Shamir, and Eran Tromer discovered that GnuPG was
susceptible to an adaptive chosen ciphertext attack via physical side
channels. A local attacker could use this attack to possibly recover
private keys.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 12.04 | noarch | gnupg | < 1.4.11-3ubuntu2.7 | UNKNOWN |
Ubuntu | 12.04 | noarch | gnupg-curl | < 1.4.11-3ubuntu2.7 | UNKNOWN |
Ubuntu | 12.04 | noarch | gnupg-udeb | < 1.4.11-3ubuntu2.7 | UNKNOWN |
Ubuntu | 12.04 | noarch | gpgv | < 1.4.11-3ubuntu2.7 | UNKNOWN |
Ubuntu | 12.04 | noarch | gpgv-udeb | < 1.4.11-3ubuntu2.7 | UNKNOWN |
Ubuntu | 10.04 | noarch | gnupg | < 1.4.10-2ubuntu1.7 | UNKNOWN |
Ubuntu | 10.04 | noarch | gnupg-curl | < 1.4.10-2ubuntu1.7 | UNKNOWN |
Ubuntu | 10.04 | noarch | gnupg-udeb | < 1.4.10-2ubuntu1.7 | UNKNOWN |
Ubuntu | 10.04 | noarch | gpgv | < 1.4.10-2ubuntu1.7 | UNKNOWN |
Ubuntu | 10.04 | noarch | gpgv-udeb | < 1.4.10-2ubuntu1.7 | UNKNOWN |