Show filters
50 Total Results
Displaying 11-20 of 50
Sort by:
Attacker Value
Unknown

CVE-2015-0837

Disclosure Date: November 29, 2019 (last updated November 27, 2024)
The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."
Attacker Value
Unknown

CVE-2011-2207

Disclosure Date: November 27, 2019 (last updated November 27, 2024)
dirmngr before 2.1.0 improperly handles certain system calls, which allows remote attackers to cause a denial of service (DOS) via a specially-crafted certificate.
Attacker Value
Unknown

CVE-2015-1607

Disclosure Date: November 20, 2019 (last updated November 08, 2023)
kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extensions and "memcpy with overlapping ranges."
Attacker Value
Unknown

CVE-2015-1606

Disclosure Date: November 20, 2019 (last updated November 08, 2023)
The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
Attacker Value
Unknown

CVE-2019-13050

Disclosure Date: June 29, 2019 (last updated November 08, 2023)
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
Attacker Value
Unknown

CVE-2019-12904

Disclosure Date: June 20, 2019 (last updated November 08, 2023)
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack
Attacker Value
Unknown

CVE-2018-1000858

Disclosure Date: December 20, 2018 (last updated November 27, 2024)
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
0
Attacker Value
Unknown

CVE-2017-7526

Disclosure Date: July 26, 2018 (last updated November 08, 2023)
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
0
Attacker Value
Unknown

CVE-2018-0495

Disclosure Date: June 13, 2018 (last updated November 08, 2023)
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
0
Attacker Value
Unknown

CVE-2018-12020

Disclosure Date: June 08, 2018 (last updated November 26, 2024)
mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.