ID CVE-2013-4242
Summary GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
References
Vulnerable Configurations
  • Canonical Ubuntu Linux 10.04 LTS
    cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts
  • Canonical Ubuntu Linux 12.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts
  • Canonical Ubuntu Linux 12.10
    cpe:2.3:o:canonical:ubuntu_linux:12.10
  • Canonical Ubuntu Linux 13.04
    cpe:2.3:o:canonical:ubuntu_linux:13.04
  • Debian GNU/Linux 6.0
    cpe:2.3:o:debian:debian_linux:6.0
  • Debian Linux 7.0
    cpe:2.3:o:debian:debian_linux:7.0
  • GnuPG (Privacy Guard) 0.0.0 (initial release)
    cpe:2.3:a:gnupg:gnupg:0.0.0
  • GnuPG (Privacy Guard) 0.2.15
    cpe:2.3:a:gnupg:gnupg:0.2.15
  • GnuPG (Privacy Guard) 0.2.16
    cpe:2.3:a:gnupg:gnupg:0.2.16
  • GnuPG (Privacy Guard) 0.2.17
    cpe:2.3:a:gnupg:gnupg:0.2.17
  • GnuPG (Privacy Guard) 0.2.18
    cpe:2.3:a:gnupg:gnupg:0.2.18
  • GnuPG (Privacy Guard) 0.2.19
    cpe:2.3:a:gnupg:gnupg:0.2.19
  • GnuPG (Privacy Guard) 0.3.0
    cpe:2.3:a:gnupg:gnupg:0.3.0
  • GnuPG (Privacy Guard) 0.3.1
    cpe:2.3:a:gnupg:gnupg:0.3.1
  • GnuPG (Privacy Guard) 0.3.2
    cpe:2.3:a:gnupg:gnupg:0.3.2
  • GnuPG (Privacy Guard) 0.3.3
    cpe:2.3:a:gnupg:gnupg:0.3.3
  • GnuPG (Privacy Guard) 0.3.4
    cpe:2.3:a:gnupg:gnupg:0.3.4
  • GnuPG (Privacy Guard) 0.3.5
    cpe:2.3:a:gnupg:gnupg:0.3.5
  • GnuPG (Privacy Guard) 0.4.0
    cpe:2.3:a:gnupg:gnupg:0.4.0
  • GnuPG (Privacy Guard) 0.4.1
    cpe:2.3:a:gnupg:gnupg:0.4.1
  • GnuPG (Privacy Guard) 0.4.3
    cpe:2.3:a:gnupg:gnupg:0.4.3
  • GnuPG (Privacy Guard) 0.4.4
    cpe:2.3:a:gnupg:gnupg:0.4.4
  • GnuPG (Privacy Guard) 0.4.5
    cpe:2.3:a:gnupg:gnupg:0.4.5
  • GnuPG (Privacy Guard) 0.9.0
    cpe:2.3:a:gnupg:gnupg:0.9.0
  • GnuPG (Privacy Guard) 0.9.1
    cpe:2.3:a:gnupg:gnupg:0.9.1
  • GnuPG (Privacy Guard) 0.9.2
    cpe:2.3:a:gnupg:gnupg:0.9.2
  • GnuPG (Privacy Guard) 0.9.3
    cpe:2.3:a:gnupg:gnupg:0.9.3
  • GnuPG (Privacy Guard) 0.9.4
    cpe:2.3:a:gnupg:gnupg:0.9.4
  • GnuPG (Privacy Guard) 0.9.5
    cpe:2.3:a:gnupg:gnupg:0.9.5
  • GnuPG (Privacy Guard) 0.9.6
    cpe:2.3:a:gnupg:gnupg:0.9.6
  • GnuPG (Privacy Guard) 0.9.7
    cpe:2.3:a:gnupg:gnupg:0.9.7
  • GnuPG (Privacy Guard) 0.9.8
    cpe:2.3:a:gnupg:gnupg:0.9.8
  • GnuPG (Privacy Guard) 0.9.9
    cpe:2.3:a:gnupg:gnupg:0.9.9
  • GnuPG (Privacy Guard) 0.9.10
    cpe:2.3:a:gnupg:gnupg:0.9.10
  • GnuPG (Privacy Guard) 0.9.11
    cpe:2.3:a:gnupg:gnupg:0.9.11
  • GnuPG (Privacy Guard) 1.0.0
    cpe:2.3:a:gnupg:gnupg:1.0.0
  • GnuPG (Privacy Guard) 1.0.1
    cpe:2.3:a:gnupg:gnupg:1.0.1
  • GnuPG (Privacy Guard) 1.0.2
    cpe:2.3:a:gnupg:gnupg:1.0.2
  • GnuPG (Privacy Guard) 1.0.3
    cpe:2.3:a:gnupg:gnupg:1.0.3
  • GnuPG (Privacy Guard) 1.0.4
    cpe:2.3:a:gnupg:gnupg:1.0.4
  • GnuPG (Privacy Guard) 1.0.4:-:win32
    cpe:2.3:a:gnupg:gnupg:1.0.4:-:win32
  • GnuPG (Privacy Guard) 1.0.5
    cpe:2.3:a:gnupg:gnupg:1.0.5
  • GnuPG (Privacy Guard) 1.0.5:-:win32
    cpe:2.3:a:gnupg:gnupg:1.0.5:-:win32
  • GnuPG (Privacy Guard) 1.0.6
    cpe:2.3:a:gnupg:gnupg:1.0.6
  • GnuPG (Privacy Guard) 1.0.7
    cpe:2.3:a:gnupg:gnupg:1.0.7
  • GnuPG (Privacy Guard) 1.2.0
    cpe:2.3:a:gnupg:gnupg:1.2.0
  • GnuPG (Privacy Guard) 1.2.1
    cpe:2.3:a:gnupg:gnupg:1.2.1
  • GnuPG (Privacy Guard) 1.2.1:windows
    cpe:2.3:a:gnupg:gnupg:1.2.1:windows
  • GnuPG (Privacy Guard) 1.2.2
    cpe:2.3:a:gnupg:gnupg:1.2.2
  • GnuPG (Privacy Guard) 1.2.3
    cpe:2.3:a:gnupg:gnupg:1.2.3
  • GnuPG (Privacy Guard) 1.2.4
    cpe:2.3:a:gnupg:gnupg:1.2.4
  • GnuPG (Privacy Guard) 1.2.5
    cpe:2.3:a:gnupg:gnupg:1.2.5
  • GnuPG (Privacy Guard) 1.2.6
    cpe:2.3:a:gnupg:gnupg:1.2.6
  • GnuPG (Privacy Guard) 1.2.7
    cpe:2.3:a:gnupg:gnupg:1.2.7
  • GnuPG (Privacy Guard) 1.3.0
    cpe:2.3:a:gnupg:gnupg:1.3.0
  • GnuPG (Privacy Guard) 1.3.1
    cpe:2.3:a:gnupg:gnupg:1.3.1
  • GnuPG (Privacy Guard) 1.3.2
    cpe:2.3:a:gnupg:gnupg:1.3.2
  • GnuPG (Privacy Guard) 1.3.3
    cpe:2.3:a:gnupg:gnupg:1.3.3
  • GnuPG (Privacy Guard) 1.3.4
    cpe:2.3:a:gnupg:gnupg:1.3.4
  • GnuPG (Privacy Guard) 1.3.6
    cpe:2.3:a:gnupg:gnupg:1.3.6
  • GnuPG (Privacy Guard) 1.3.90
    cpe:2.3:a:gnupg:gnupg:1.3.90
  • GnuPG (Privacy Guard) 1.3.91
    cpe:2.3:a:gnupg:gnupg:1.3.91
  • GnuPG (Privacy Guard) 1.3.92
    cpe:2.3:a:gnupg:gnupg:1.3.92
  • GnuPG (Privacy Guard) 1.3.93
    cpe:2.3:a:gnupg:gnupg:1.3.93
  • GnuPG (Privacy Guard) 1.4.0
    cpe:2.3:a:gnupg:gnupg:1.4.0
  • GnuPG (Privacy Guard) 1.4.10
    cpe:2.3:a:gnupg:gnupg:1.4.10
  • GnuPG (Privacy Guard) 1.4.11
    cpe:2.3:a:gnupg:gnupg:1.4.11
  • GnuPG (Privacy Guard) 1.4.12
    cpe:2.3:a:gnupg:gnupg:1.4.12
  • GnuPG (Privacy Guard) 1.4.13
    cpe:2.3:a:gnupg:gnupg:1.4.13
  • GnuPG (Privacy Guard) 2.0.1
    cpe:2.3:a:gnupg:gnupg:2.0.1
  • GnuPG (Privacy Guard) 2.0.3
    cpe:2.3:a:gnupg:gnupg:2.0.3
  • GnuPG (Privacy Guard) 2.0.4
    cpe:2.3:a:gnupg:gnupg:2.0.4
  • GnuPG (Privacy Guard) 2.0.5
    cpe:2.3:a:gnupg:gnupg:2.0.5
  • GnuPG (Privacy Guard) 2.0.6
    cpe:2.3:a:gnupg:gnupg:2.0.6
  • GnuPG (Privacy Guard) 2.0.7
    cpe:2.3:a:gnupg:gnupg:2.0.7
  • GnuPG (Privacy Guard) 2.0.8
    cpe:2.3:a:gnupg:gnupg:2.0.8
  • GnuPG (Privacy Guard) 2.0.10
    cpe:2.3:a:gnupg:gnupg:2.0.10
  • GnuPG (Privacy Guard) 2.0.11
    cpe:2.3:a:gnupg:gnupg:2.0.11
  • GnuPG (Privacy Guard) 2.0.12
    cpe:2.3:a:gnupg:gnupg:2.0.12
  • GnuPG (Privacy Guard) 2.0.13
    cpe:2.3:a:gnupg:gnupg:2.0.13
  • GnuPG (Privacy Guard) 2.0.14
    cpe:2.3:a:gnupg:gnupg:2.0.14
  • GnuPG (Privacy Guard) 2.0.15
    cpe:2.3:a:gnupg:gnupg:2.0.15
  • GnuPG (Privacy Guard) 2.0.16
    cpe:2.3:a:gnupg:gnupg:2.0.16
  • GnuPG (Privacy Guard) 2.0.17
    cpe:2.3:a:gnupg:gnupg:2.0.17
  • GnuPG (Privacy Guard) 2.0.18
    cpe:2.3:a:gnupg:gnupg:2.0.18
  • GnuPG (Privacy Guard) 2.0.19
    cpe:2.3:a:gnupg:gnupg:2.0.19
  • GnuPG Libgcrypt 1.4.0
    cpe:2.3:a:gnupg:libgcrypt:1.4.0
  • GnuPG Libgcrypt 1.4.3
    cpe:2.3:a:gnupg:libgcrypt:1.4.3
  • GnuPG Libgcrypt 1.4.4
    cpe:2.3:a:gnupg:libgcrypt:1.4.4
  • GnuPG Libgcrypt 1.4.5
    cpe:2.3:a:gnupg:libgcrypt:1.4.5
  • GnuPG Libgcrypt 1.4.6
    cpe:2.3:a:gnupg:libgcrypt:1.4.6
  • GnuPG Libgcrypt 1.5.0
    cpe:2.3:a:gnupg:libgcrypt:1.5.0
  • GnuPG Libgcrypt 1.5.1
    cpe:2.3:a:gnupg:libgcrypt:1.5.1
  • GnuPG Libgcrypt 1.5.2
    cpe:2.3:a:gnupg:libgcrypt:1.5.2
  • OpenSUSE 12.2
    cpe:2.3:o:opensuse:opensuse:12.2
  • OpenSUSE 12.3
    cpe:2.3:o:opensuse:opensuse:12.3
CVSS
Base: 1.9 (as of 23-10-2013 - 10:23)
Impact:
Exploitability:
CWE CWE-200
CAPEC
  • Subverting Environment Variable Values
    The attacker directly or indirectly modifies environment variables used by or controlling the target software. The attacker's goal is to cause the target software to deviate from its expected operation in a manner that benefits the attacker.
  • Footprinting
    An attacker engages in probing and exploration activity to identify constituents and properties of the target. Footprinting is a general term to describe a variety of information gathering techniques, often used by attackers in preparation for some attack. It consists of using tools to learn as much as possible about the composition, configuration, and security mechanisms of the targeted application, system or network. Information that might be collected during a footprinting effort could include open ports, applications and their versions, network topology, and similar information. While footprinting is not intended to be damaging (although certain activities, such as network scans, can sometimes cause disruptions to vulnerable applications inadvertently) it may often pave the way for more damaging attacks.
  • Exploiting Trust in Client (aka Make the Client Invisible)
    An attack of this type exploits a programs' vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by placing themselves in the communication channel between client and server such that communication directly to the server is possible where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
  • Browser Fingerprinting
    An attacker carefully crafts small snippets of Java Script to efficiently detect the type of browser the potential victim is using. Many web-based attacks need prior knowledge of the web browser including the version of browser to ensure successful exploitation of a vulnerability. Having this knowledge allows an attacker to target the victim with attacks that specifically exploit known or zero day weaknesses in the type and version of the browser used by the victim. Automating this process via Java Script as a part of the same delivery system used to exploit the browser is considered more efficient as the attacker can supply a browser fingerprinting method and integrate it with exploit code, all contained in Java Script and in response to the same web page request by the browser.
  • Session Credential Falsification through Prediction
    This attack targets predictable session ID in order to gain privileges. The attacker can predict the session ID used during a transaction to perform spoofing and session hijacking.
  • Reusing Session IDs (aka Session Replay)
    This attack targets the reuse of valid session ID to spoof the target system in order to gain privileges. The attacker tries to reuse a stolen session ID used previously during a transaction to perform spoofing and session hijacking. Another name for this type of attack is Session Replay.
  • Using Slashes in Alternate Encoding
    This attack targets the encoding of the Slash characters. An attacker would try to exploit common filtering problems related to the use of the slashes characters to gain access to resources on the target host. Directory-driven systems, such as file systems and databases, typically use the slash character to indicate traversal between directories or other container components. For murky historical reasons, PCs (and, as a result, Microsoft OSs) choose to use a backslash, whereas the UNIX world typically makes use of the forward slash. The schizophrenic result is that many MS-based systems are required to understand both forms of the slash. This gives the attacker many opportunities to discover and abuse a number of common filtering problems. The goal of this pattern is to discover server software that only applies filters to one version, but not the other.
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
nessus via4
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20131024_GNUPG_ON_SL5_X.NASL
    description It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload cache side-channel attack on the RSA secret exponent. An attacker able to execute a process on the logical CPU that shared the L3 cache with the GnuPG process (such as a different local user or a user of a KVM guest running on the same host with the kernel same-page merging functionality enabled) could possibly use this flaw to obtain portions of the RSA secret key. (CVE-2013-4242) A denial of service flaw was found in the way GnuPG parsed certain compressed OpenPGP packets. An attacker could use this flaw to send specially crafted input data to GnuPG, making GnuPG enter an infinite loop when parsing data. (CVE-2013-4402) It was found that importing a corrupted public key into a GnuPG keyring database corrupted that keyring. An attacker could use this flaw to trick a local user into importing a specially crafted public key into their keyring database, causing the keyring to be corrupted and preventing its further use. (CVE-2012-6085) It was found that GnuPG did not properly interpret the key flags in a PGP key packet. GPG could accept a key for uses not indicated by its holder. (CVE-2013-4351)
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 70604
    published 2013-10-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70604
    title Scientific Linux Security Update : gnupg on SL5.x i386/x86_64
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2013-1458.NASL
    description An updated gnupg package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with the proposed OpenPGP Internet standard and the S/MIME standard. It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload cache side-channel attack on the RSA secret exponent. An attacker able to execute a process on the logical CPU that shared the L3 cache with the GnuPG process (such as a different local user or a user of a KVM guest running on the same host with the kernel same-page merging functionality enabled) could possibly use this flaw to obtain portions of the RSA secret key. (CVE-2013-4242) A denial of service flaw was found in the way GnuPG parsed certain compressed OpenPGP packets. An attacker could use this flaw to send specially crafted input data to GnuPG, making GnuPG enter an infinite loop when parsing data. (CVE-2013-4402) It was found that importing a corrupted public key into a GnuPG keyring database corrupted that keyring. An attacker could use this flaw to trick a local user into importing a specially crafted public key into their keyring database, causing the keyring to be corrupted and preventing its further use. (CVE-2012-6085) It was found that GnuPG did not properly interpret the key flags in a PGP key packet. GPG could accept a key for uses not indicated by its holder. (CVE-2013-4351) Red Hat would like to thank Werner Koch for reporting the CVE-2013-4402 issue. Upstream acknowledges Taylor R Campbell as the original reporter. All gnupg users are advised to upgrade to this updated package, which contains backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 70634
    published 2013-10-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70634
    title CentOS 5 : gnupg (CESA-2013:1458)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201402-24.NASL
    description The remote host is affected by the vulnerability described in GLSA-201402-24 (GnuPG, Libgcrypt: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in GnuPG and Libgcrypt. Please review the CVE identifiers referenced below for details. Impact : An unauthenticated remote attacker may be able to execute arbitrary code with the privileges of the user running GnuPG, cause a Denial of Service condition, or bypass security restrictions. Additionally, a side-channel attack may allow a local attacker to recover a private key, please review “Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack” in the References section for further details. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 72638
    published 2014-02-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=72638
    title GLSA-201402-24 : GnuPG, Libgcrypt: Multiple vulnerabilities
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2013-1458.NASL
    description From Red Hat Security Advisory 2013:1458 : An updated gnupg package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with the proposed OpenPGP Internet standard and the S/MIME standard. It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload cache side-channel attack on the RSA secret exponent. An attacker able to execute a process on the logical CPU that shared the L3 cache with the GnuPG process (such as a different local user or a user of a KVM guest running on the same host with the kernel same-page merging functionality enabled) could possibly use this flaw to obtain portions of the RSA secret key. (CVE-2013-4242) A denial of service flaw was found in the way GnuPG parsed certain compressed OpenPGP packets. An attacker could use this flaw to send specially crafted input data to GnuPG, making GnuPG enter an infinite loop when parsing data. (CVE-2013-4402) It was found that importing a corrupted public key into a GnuPG keyring database corrupted that keyring. An attacker could use this flaw to trick a local user into importing a specially crafted public key into their keyring database, causing the keyring to be corrupted and preventing its further use. (CVE-2012-6085) It was found that GnuPG did not properly interpret the key flags in a PGP key packet. GPG could accept a key for uses not indicated by its holder. (CVE-2013-4351) Red Hat would like to thank Werner Koch for reporting the CVE-2013-4402 issue. Upstream acknowledges Taylor R Campbell as the original reporter. All gnupg users are advised to upgrade to this updated package, which contains backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 70597
    published 2013-10-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70597
    title Oracle Linux 5 : gnupg (ELSA-2013-1458)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2013-1458.NASL
    description An updated gnupg package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with the proposed OpenPGP Internet standard and the S/MIME standard. It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload cache side-channel attack on the RSA secret exponent. An attacker able to execute a process on the logical CPU that shared the L3 cache with the GnuPG process (such as a different local user or a user of a KVM guest running on the same host with the kernel same-page merging functionality enabled) could possibly use this flaw to obtain portions of the RSA secret key. (CVE-2013-4242) A denial of service flaw was found in the way GnuPG parsed certain compressed OpenPGP packets. An attacker could use this flaw to send specially crafted input data to GnuPG, making GnuPG enter an infinite loop when parsing data. (CVE-2013-4402) It was found that importing a corrupted public key into a GnuPG keyring database corrupted that keyring. An attacker could use this flaw to trick a local user into importing a specially crafted public key into their keyring database, causing the keyring to be corrupted and preventing its further use. (CVE-2012-6085) It was found that GnuPG did not properly interpret the key flags in a PGP key packet. GPG could accept a key for uses not indicated by its holder. (CVE-2013-4351) Red Hat would like to thank Werner Koch for reporting the CVE-2013-4402 issue. Upstream acknowledges Taylor R Campbell as the original reporter. All gnupg users are advised to upgrade to this updated package, which contains backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 70601
    published 2013-10-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70601
    title RHEL 5 : gnupg (RHSA-2013:1458)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2013-1457.NASL
    description An updated libgcrypt package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload cache side-channel attack on the RSA secret exponent. An attacker able to execute a process on the logical CPU that shared the L3 cache with the GnuPG process (such as a different local user or a user of a KVM guest running on the same host with the kernel same-page merging functionality enabled) could possibly use this flaw to obtain portions of the RSA secret key. (CVE-2013-4242) All libgcrypt users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 70600
    published 2013-10-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70600
    title RHEL 5 / 6 : libgcrypt (RHSA-2013:1457)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20131024_LIBGCRYPT_ON_SL5_X.NASL
    description It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload cache side-channel attack on the RSA secret exponent. An attacker able to execute a process on the logical CPU that shared the L3 cache with the GnuPG process (such as a different local user or a user of a KVM guest running on the same host with the kernel same-page merging functionality enabled) could possibly use this flaw to obtain portions of the RSA secret key. (CVE-2013-4242)
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 70605
    published 2013-10-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70605
    title Scientific Linux Security Update : libgcrypt on SL5.x, SL6.x i386/x86_64
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2730.NASL
    description Yarom and Falkner discovered that RSA secret keys could be leaked via a side channel attack, where a malicious local user could obtain private key information from another user on the system. This update fixes this issue for the 1.4 series of GnuPG. GnuPG 2.x is affected through its use of the libgcrypt11 library, a fix for which will be published in DSA 2731.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 69108
    published 2013-07-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69108
    title Debian DSA-2730-1 : gnupg - information leak
  • NASL family F5 Networks Local Security Checks
    NASL id F5_BIGIP_SOL75253136.NASL
    description GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload. (CVE-2013-4242)
    last seen 2019-02-21
    modified 2019-01-04
    plugin id 88874
    published 2016-02-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=88874
    title F5 Networks BIG-IP : GnuPG vulnerability (K75253136)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS11_LIBGCRYPT_20140512.NASL
    description The remote Solaris system is missing necessary patches to address security updates : - GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload. (CVE-2013-4242)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 80671
    published 2015-01-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80671
    title Oracle Solaris Third-Party Patch Update : libgcrypt (cve_2013_4242_information_disclosure)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2013-225.NASL
    description GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 70229
    published 2013-10-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70229
    title Amazon Linux AMI : gnupg (ALAS-2013-225)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2013-205.NASL
    description A vulnerability has been discovered and corrected in gnupg and in libgcrypt : Yarom and Falkner discovered that RSA secret keys in applications using GnuPG 1.x, and using the libgcrypt library, could be leaked via a side channel attack, where a malicious local user could obtain private key information from another user on the system (CVE-2013-4242). The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 69190
    published 2013-08-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69190
    title Mandriva Linux Security Advisory : gnupg (MDVSA-2013:205)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2013-13671.NASL
    description Minor update from upstream fixing a moderate impact security issue. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 69186
    published 2013-08-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69186
    title Fedora 18 : libgcrypt-1.5.3-1.fc18 (2013-13671)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2013-226.NASL
    description GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 70230
    published 2013-10-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70230
    title Amazon Linux AMI : libgcrypt (ALAS-2013-226)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2013-13678.NASL
    description Minor update from upstream fixing a moderate impact security issue. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 69187
    published 2013-08-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69187
    title Fedora 19 : libgcrypt-1.5.3-1.fc19 (2013-13678)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2013-13975.NASL
    description Fix for CVE-2013-4242 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 69289
    published 2013-08-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69289
    title Fedora 19 : gnupg-1.4.14-1.fc19 (2013-13975)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2013-215-01.NASL
    description New gnupg and libgcrypt packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix a security issue. New libgpg-error packages are also available for Slackware 13.1 and older as the supplied version wasn't new enough to compile the fixed version of libgcrypt.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 69196
    published 2013-08-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69196
    title Slackware 12.1 / 12.2 / 13.0 / 13.1 / 13.37 / 14.0 / current : gnupg / libgcrypt (SSA:2013-215-01)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2013-1457.NASL
    description An updated libgcrypt package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload cache side-channel attack on the RSA secret exponent. An attacker able to execute a process on the logical CPU that shared the L3 cache with the GnuPG process (such as a different local user or a user of a KVM guest running on the same host with the kernel same-page merging functionality enabled) could possibly use this flaw to obtain portions of the RSA secret key. (CVE-2013-4242) All libgcrypt users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 70633
    published 2013-10-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70633
    title CentOS 5 / 6 : libgcrypt (CESA-2013:1457)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2013-1457.NASL
    description From Red Hat Security Advisory 2013:1457 : An updated libgcrypt package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload cache side-channel attack on the RSA secret exponent. An attacker able to execute a process on the logical CPU that shared the L3 cache with the GnuPG process (such as a different local user or a user of a KVM guest running on the same host with the kernel same-page merging functionality enabled) could possibly use this flaw to obtain portions of the RSA secret key. (CVE-2013-4242) All libgcrypt users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 70596
    published 2013-10-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70596
    title Oracle Linux 5 / 6 : libgcrypt (ELSA-2013-1457)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1923-1.NASL
    description Yuval Yarom and Katrina Falkner discovered a timing-based information leak, known as Flush+Reload, that could be used to trace execution in programs. GnuPG and Libgcrypt followed different execution paths based on key-related data, which could be used to expose the contents of private keys. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 69175
    published 2013-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69175
    title Ubuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.04 : gnupg, libgcrypt11 vulnerability (USN-1923-1)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_689C2BF7070111E39A25002590860428.NASL
    description Werner Koch of the GNU project reports : Noteworthy changes in version 1.5.3 : Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA secret keys... Note that Libgcrypt is used by GnuPG 2.x and thus this release fixes the above problem. The fix for GnuPG less than 2.0 can be found in the just released GnuPG 1.4.14.
    last seen 2019-02-21
    modified 2018-11-21
    plugin id 69396
    published 2013-08-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69396
    title FreeBSD : GnuPG and Libgcrypt -- side-channel attack vulnerability (689c2bf7-0701-11e3-9a25-002590860428)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2731.NASL
    description Yarom and Falkner discovered that RSA secret keys in applications using the libgcrypt11 library, for example GnuPG 2.x, could be leaked via a side channel attack, where a malicious local user could obtain private key information from another user on the system.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 69109
    published 2013-07-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69109
    title Debian DSA-2731-1 : libgcrypt11 - information leak
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2016-0062.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - fix CVE-2013-4242 GnuPG/libgcrypt susceptible to cache side-channel attack - Add GCRYCTL_SET_ENFORCED_FIPS_FLAG command
    last seen 2019-02-21
    modified 2018-07-24
    plugin id 91744
    published 2016-06-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91744
    title OracleVM 3.2 : libgcrypt (OVMSA-2016-0062)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_LIBGCRYPT-130813.NASL
    description This update of libgcrypt mitigates the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. (CVE-2013-4242)
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 69374
    published 2013-08-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69374
    title SuSE 11.2 / 11.3 Security Update : libgcrypt (SAT Patch Numbers 8201 / 8202)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2013-13940.NASL
    description Fix for CVE-2013-4242 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 69356
    published 2013-08-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69356
    title Fedora 18 : gnupg-1.4.14-1.fc18 (2013-13940)
redhat via4
advisories
bugzilla
id 988589
title CVE-2013-4242 GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack
oval
OR
  • AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    • OR
      • AND
        • comment libgcrypt is earlier than 0:1.4.5-11.el6_4
          oval oval:com.redhat.rhsa:tst:20131457005
        • comment libgcrypt is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20131457006
      • AND
        • comment libgcrypt-devel is earlier than 0:1.4.5-11.el6_4
          oval oval:com.redhat.rhsa:tst:20131457007
        • comment libgcrypt-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20131457008
  • AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment libgcrypt is earlier than 0:1.4.4-7.el5_10
          oval oval:com.redhat.rhsa:tst:20131457010
        • comment libgcrypt is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20131457011
      • AND
        • comment libgcrypt-devel is earlier than 0:1.4.4-7.el5_10
          oval oval:com.redhat.rhsa:tst:20131457012
        • comment libgcrypt-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20131457013
rhsa
id RHSA-2013:1457
released 2013-10-24
severity Moderate
title RHSA-2013:1457: libgcrypt security update (Moderate)
rpms
  • libgcrypt-0:1.4.5-11.el6_4
  • libgcrypt-devel-0:1.4.5-11.el6_4
  • libgcrypt-0:1.4.4-7.el5_10
  • libgcrypt-devel-0:1.4.4-7.el5_10
  • gnupg-0:1.4.5-18.el5_10
refmap via4
bid 61464
cert-vn VU#976534
confirm
debian
  • DSA-2730
  • DSA-2731
misc
mlist [gnupg-announce] 20130725 [Announce] [security fix] GnuPG 1.4.14 released
secunia
  • 54318
  • 54321
  • 54332
  • 54375
suse openSUSE-SU-2013:1294
ubuntu USN-1923-1
Last major update 07-12-2016 - 22:03
Published 19-08-2013 - 19:55
Last modified 30-10-2018 - 12:27
Back to Top