[Forgot Password]
Login  Register Subscribe

23631

 
 

126941

 
 

98250

 
 

909

 
 

79281

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2013-4242

Date: (C)2013-08-20   (M)2017-11-18 


GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

CVSS Score: 1.9Access Vector: LOCAL
Exploit Score: 3.4Access Complexity: MEDIUM
Impact Score: 2.9Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: NONE
 Availability: NONE





Reference:
SECUNIA-54318
SECUNIA-54321
SECUNIA-54332
SECUNIA-54375
BID-61464
DSA-2730
DSA-2731
IAVM:2014-A-0062
RHSA-2013:1457
USN-1923-1
VU#976534
http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880
http://eprint.iacr.org/2013/448
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
openSUSE-SU-2013:1294

CPE    96
cpe:/o:novell:opensuse:12.2
cpe:/a:gnupg:gnupg:0.2.16
cpe:/a:gnupg:gnupg:0.2.15
cpe:/a:gnupg:gnupg:0.2.18
...
CWE    1
CWE-200
OVAL    23
oval:org.secpod.oval:def:106074
oval:org.secpod.oval:def:1300221
oval:org.secpod.oval:def:105616
oval:org.secpod.oval:def:105448
...
XCCDF    1
CWE-200

© 2013 SecPod Technologies