CVE-2017-7526
Published: 29 June 2017
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
Priority
Status
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.8 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Changed |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526
- https://eprint.iacr.org/2017/627
- https://ubuntu.com/security/notices/USN-3347-1
- https://ubuntu.com/security/notices/USN-3347-2
- https://ubuntu.com/security/notices/USN-3733-1
- https://ubuntu.com/security/notices/USN-3733-2
- NVD
- Launchpad
- Debian