Use of a Broken or Risky Cryptographic Algorithm
Affecting libgcrypt20 package, versions *
Report new vulnerabilities
Do your applications use this vulnerable package?
Test your applications
Overview
cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
References
CVSS Score
7.5
low severity
-
Attack VectorNetwork
-
Attack ComplexityLow
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityHigh
-
IntegrityNone
-
AvailabilityNone
- CVE
- CVE-2018-6829
- CWE
- CWE-327
- Snyk ID
- SNYK-DEBIAN10-LIBGCRYPT20-391902
- Disclosed
- 07 Feb, 2018
- Published
- 07 Feb, 2018