cve/2018/CVE-2018-6829.md
2024-06-09 00:33:16 +00:00

32 lines
1.6 KiB
Markdown

### [CVE-2018-6829](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6829)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
### POC
#### Reference
- https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
- https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
- https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
- https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Dalifo/wik-dvs-tp02
- https://github.com/GrigGM/05-virt-04-docker-hw
- https://github.com/PajakAlexandre/wik-dps-tp02
- https://github.com/cdupuis/image-api
- https://github.com/flyrev/security-scan-ci-presentation
- https://github.com/fokypoky/places-list
- https://github.com/garethr/snykout
- https://github.com/mauraneh/WIK-DPS-TP02
- https://github.com/testing-felickz/docker-scout-demo