Vulnerability Details : CVE-2013-4242
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2013-4242
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-4242
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:P/I:N/A:N |
3.4
|
2.9
|
[email protected] |
CWE ids for CVE-2013-4242
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: [email protected] (Primary)
References for CVE-2013-4242
-
http://www.debian.org/security/2013/dsa-2730
-
http://www.ubuntu.com/usn/USN-1923-1
Vendor Advisory
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
-
http://www.debian.org/security/2013/dsa-2731
-
http://rhn.redhat.com/errata/RHSA-2013-1457.html
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880
-
http://www.kb.cert.org/vuls/id/976534
US Government Resource
-
http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
-
http://eprint.iacr.org/2013/448
-
http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html
Vendor Advisory
-
http://www.securityfocus.com/bid/61464
Products affected by CVE-2013-4242
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.0.4:-:win32:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.0.5:-:win32:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.3.90:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.2.1:windows:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.3.93:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.3.91:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:1.3.92:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.2.19:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.9.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.9.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.2.18:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.2.17:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:gnupg:0.0.0:-:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnupg:libgcrypt:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*