Show filters
50 Total Results
Displaying 1-10 of 50
Sort by:
Attacker Value
Unknown
CVE-2022-3219
Disclosure Date: February 23, 2023 (last updated October 08, 2023)
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
0
Attacker Value
Unknown
CVE-2022-3515
Disclosure Date: January 12, 2023 (last updated October 08, 2023)
A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.
0
Attacker Value
Unknown
CVE-2022-47629
Disclosure Date: December 20, 2022 (last updated October 08, 2023)
Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.
0
Attacker Value
Unknown
CVE-2022-34903
Disclosure Date: July 01, 2022 (last updated October 07, 2023)
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
0
Attacker Value
Unknown
CVE-2021-40528
Disclosure Date: September 06, 2021 (last updated November 08, 2023)
The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
0
Attacker Value
Unknown
CVE-2021-33560
Disclosure Date: June 08, 2021 (last updated November 08, 2023)
Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.
0
Attacker Value
Unknown
CVE-2021-3345
Disclosure Date: January 29, 2021 (last updated November 08, 2023)
_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.
0
Attacker Value
Unknown
CVE-2020-25125
Disclosure Date: September 03, 2020 (last updated November 28, 2024)
GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version.
0
Attacker Value
Unknown
CVE-2019-14855
Disclosure Date: March 20, 2020 (last updated November 27, 2024)
A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
0
Attacker Value
Unknown
CVE-2014-3591
Disclosure Date: November 29, 2019 (last updated November 27, 2024)
Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.
0