CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
EPSS
Percentile
5.3%
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and
possibly other products, allows local users to obtain private RSA keys via
a cache side-channel attack involving the L3 cache, aka Flush+Reload.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 10.04 | noarch | gnupg | < 1.4.10-2ubuntu1.3 | UNKNOWN |
ubuntu | 12.04 | noarch | gnupg | < 1.4.11-3ubuntu2.3 | UNKNOWN |
ubuntu | 12.10 | noarch | gnupg | < 1.4.11-3ubuntu4.2 | UNKNOWN |
ubuntu | 13.04 | noarch | gnupg | < 1.4.12-7ubuntu1.1 | UNKNOWN |
ubuntu | 10.04 | noarch | libgcrypt11 | < 1.4.4-5ubuntu2.2 | UNKNOWN |
ubuntu | 12.04 | noarch | libgcrypt11 | < 1.5.0-3ubuntu0.2 | UNKNOWN |
ubuntu | 12.10 | noarch | libgcrypt11 | < 1.5.0-3ubuntu1.1 | UNKNOWN |
ubuntu | 13.04 | noarch | libgcrypt11 | < 1.5.0-3ubuntu2.2 | UNKNOWN |
eprint.iacr.org/2013/448
lists.gnupg.org/pipermail/gnupg-announce/2013q3/000329.html
lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html
launchpad.net/bugs/cve/CVE-2013-4242
nvd.nist.gov/vuln/detail/CVE-2013-4242
security-tracker.debian.org/tracker/CVE-2013-4242
ubuntu.com/security/notices/USN-1923-1
www.cve.org/CVERecord?id=CVE-2013-4242