Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576.
References
Link | Resource |
---|---|
http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html | Patch Vendor Advisory |
http://openwall.com/lists/oss-security/2014/08/16/2 | Mailing List Third Party Advisory |
http://www.cs.tau.ac.il/~tromer/handsoff/ | Technical Description |
http://www.debian.org/security/2014/dsa-3024 | |
http://www.debian.org/security/2014/dsa-3073 | Third Party Advisory |
http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html | Patch Vendor Advisory |
http://openwall.com/lists/oss-security/2014/08/16/2 | Mailing List Third Party Advisory |
http://www.cs.tau.ac.il/~tromer/handsoff/ | Technical Description |
http://www.debian.org/security/2014/dsa-3024 | |
http://www.debian.org/security/2014/dsa-3073 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html - Patch, Vendor Advisory | |
References | () http://openwall.com/lists/oss-security/2014/08/16/2 - Mailing List, Third Party Advisory | |
References | () http://www.cs.tau.ac.il/~tromer/handsoff/ - Technical Description | |
References | () http://www.debian.org/security/2014/dsa-3024 - | |
References | () http://www.debian.org/security/2014/dsa-3073 - Third Party Advisory |
Information
Published : 2014-10-10 01:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5270
Mitre link : CVE-2014-5270
CVE.ORG link : CVE-2014-5270
JSON object : View
Products Affected
debian
- debian_linux
gnupg
- libgcrypt
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor