Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-33560
HistoryJun 08, 2021 - 12:00 a.m.

CVE-2021-33560

2021-06-0800:00:00
ubuntu.com
ubuntu.com
30
libgcrypt
elgamal encryption
openpgp
side-channel attack
mpi_powm

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

61.1%

Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption
because it lacks exponent blinding to address a side-channel attack against
mpi_powm, and the window size is not chosen appropriately. This, for
example, affects use of ElGamal in OpenPGP.

Bugs

Notes

Author Note
mdeslaur This CVE was originally for the issue that is now CVE=2021-40528 but somehow got switched to the exponent blinding issue instead. The fix to add exponent blinding appears to only have been added to 1.9.x but never backported to 1.8.x, contrary to the CVE description The commit below was never backported to 1.8.x because the upstream developers consider this hardening and not a security issue.

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

61.1%