cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
References
Link | Resource |
---|---|
https://github.com/weikengchen/attack-on-libgcrypt-elgamal | Third Party Advisory |
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki | Exploit Third Party Advisory |
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html | Issue Tracking Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2020.html |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-02-07T23:00:00
Updated: 2020-01-15T19:15:22
Reserved: 2018-02-07T00:00:00
Link: CVE-2018-6829
JSON object: View
NVD Information
Status : Modified
Published: 2018-02-07T23:29:01.703
Modified: 2020-01-15T20:15:18.557
Link: CVE-2018-6829
JSON object: View
Redhat Information
No data.
CWE