The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
References
Configurations
History
21 Nov 2024, 06:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://eprint.iacr.org/2021/923 - Technical Description, Third Party Advisory | |
References | () https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 - Third Party Advisory | |
References | () https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2 - Exploit, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/57OJA2K5AHX5HAU2QBDRWLGIIUX7GASC/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HGVBZ2TTRKCTYAZTRHTF6OBD4W37F5MT/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VJYOZGWI7TD27SEXILSM6VUTPPEICDL7/ - |
18 Oct 2021, 11:58
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJYOZGWI7TD27SEXILSM6VUTPPEICDL7/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57OJA2K5AHX5HAU2QBDRWLGIIUX7GASC/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HGVBZ2TTRKCTYAZTRHTF6OBD4W37F5MT/ - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* |
05 Oct 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Oct 2021, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Oct 2021, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Sep 2021, 16:52
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-327 | |
References | (MISC) https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 - Third Party Advisory | |
References | (MISC) https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2 - Exploit, Third Party Advisory | |
References | (MISC) https://eprint.iacr.org/2021/923 - Technical Description, Third Party Advisory | |
CPE | cpe:2.3:a:cryptopp:crypto\+\+:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 2.6
v3 : 5.9 |
06 Sep 2021, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-06 19:15
Updated : 2024-11-21 06:24
NVD link : CVE-2021-40530
Mitre link : CVE-2021-40530
CVE.ORG link : CVE-2021-40530
JSON object : View
Products Affected
fedoraproject
- fedora
cryptopp
- crypto\+\+
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm