Debian DSA-3184-1 : gnupg - security update

medium Nessus Plugin ID 81794

Synopsis

The remote Debian host is missing a security-related update.

Description

Multiple vulnerabilities were discovered in GnuPG, the GNU Privacy Guard :

- CVE-2014-3591 The Elgamal decryption routine was susceptible to a side-channel attack discovered by researchers of Tel Aviv University. Ciphertext blinding was enabled to counteract it. Note that this may have a quite noticeable impact on Elgamal decryption performance.

- CVE-2015-0837 The modular exponentiation routine mpi_powm() was susceptible to a side-channel attack caused by data-dependent timing variations when accessing its internal pre-computed table.

- CVE-2015-1606 The keyring parsing code did not properly reject certain packet types not belonging in a keyring, which caused an access to memory already freed. This could allow remote attackers to cause a denial of service (crash) via crafted keyring files.

Solution

Upgrade the gnupg packages.

For the stable distribution (wheezy), these problems have been fixed in version 1.4.12-7+deb7u7.

For the upcoming stable distribution (jessie), these problems have been fixed in version 1.4.18-7.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778652

https://security-tracker.debian.org/tracker/CVE-2014-3591

https://security-tracker.debian.org/tracker/CVE-2015-0837

https://security-tracker.debian.org/tracker/CVE-2015-1606

https://packages.debian.org/source/wheezy/gnupg

https://www.debian.org/security/2015/dsa-3184

Plugin Details

Severity: Medium

ID: 81794

File Name: debian_DSA-3184.nasl

Version: 1.10

Type: local

Agent: unix

Published: 3/13/2015

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:gnupg, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 3/12/2015

Vulnerability Publication Date: 11/20/2019

Reference Information

CVE: CVE-2014-3591, CVE-2015-0837, CVE-2015-1606

DSA: 3184