CVE-2018-6829

cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:11

Type Values Removed Values Added
References () https://github.com/weikengchen/attack-on-libgcrypt-elgamal - Third Party Advisory () https://github.com/weikengchen/attack-on-libgcrypt-elgamal - Third Party Advisory
References () https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki - Exploit, Third Party Advisory () https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki - Exploit, Third Party Advisory
References () https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html - Issue Tracking, Third Party Advisory () https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html - Issue Tracking, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujan2020.html - () https://www.oracle.com/security-alerts/cpujan2020.html -

Information

Published : 2018-02-07 23:29

Updated : 2024-11-21 04:11


NVD link : CVE-2018-6829

Mitre link : CVE-2018-6829

CVE.ORG link : CVE-2018-6829


JSON object : View

Products Affected

gnupg

  • libgcrypt
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm