Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2015.0104
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2015-0104)
Zusammenfassung:The remote host is missing an update for the 'gnupg, libgcrypt' package(s) announced via the MGASA-2015-0104 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'gnupg, libgcrypt' package(s) announced via the MGASA-2015-0104 advisory.

Vulnerability Insight:
GnuPG before 1.4.19 is vulnerable to a side-channel attack which can
potentially lead to an information leak (CVE-2014-3591).

GnuPG before 1.4.19 is vulnerable to a side-channel attack on data-dependent
timing variations in modular exponentiation, which can potentially lead to an
information leak (CVE-2015-0837).

The gnupg package has been patched to correct these issues.

GnuPG2 is vulnerable to these issues through the libgcrypt library. The
issues were fixed in libgcrypt 1.6.3. The libgcrypt package in Mageia,
at version 1.5.4, was only vulnerable to the CVE-2014-3591 issue. It has
also been patched to correct this issue.

Affected Software/OS:
'gnupg, libgcrypt' package(s) on Mageia 4.

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-3591
http://www.cs.tau.ac.il/~tromer/radioexp/
http://www.debian.org/security/2015/dsa-3184
http://www.debian.org/security/2015/dsa-3185
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-0837
https://ieeexplore.ieee.org/document/7163050
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.