cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
The product uses a broken or risky cryptographic algorithm or protocol.
Link | Tags |
---|---|
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki | third party advisory exploit |
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html | third party advisory issue tracking |
https://github.com/weikengchen/attack-on-libgcrypt-elgamal | third party advisory |
https://www.oracle.com/security-alerts/cpujan2020.html |