Executive Summary

Summary
Title GnuPG: RNG output is predictable
Informations
Name GLSA-201612-01 First vendor Publication 2016-12-02
Vendor Gentoo Last vendor Modification 2016-12-02
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

Due to a design flaw, the output of GnuPG's Random Number Generator
(RNG) is predictable.

Background

The GNU Privacy Guard, GnuPG, is a free replacement for the PGP suite of cryptographic software.

Description

A long standing bug (since 1998) in Libgcrypt (see "GLSA 201610-04"
below) and GnuPG allows an attacker to predict the output from the standard RNG. Please review the "Entropy Loss and Output Predictability in the Libgcrypt PRNG" paper below for a deep technical analysis.

Impact

An attacker who obtains 580 bytes of the random number from the standard RNG can trivially predict the next 20 bytes of output.

This flaw does not affect the default generation of keys, because running gpg for key creation creates at most 2 keys from the pool. For a single 4096 bit RSA key, 512 bytes of random are required and thus for the second key (encryption subkey), 20 bytes could be predicted from the the first key.

However, the security of an OpenPGP key depends on the primary key
(which was generated first) and thus the 20 predictable bytes should not be a problem. For the default key length of 2048 bit nothing will be predictable.

Workaround

There is no known workaround at this time.

Resolution

All GnuPG 1 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.21"

References

[ 1 ] CVE-2016-6313
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6313
[ 2 ] Entropy Loss and Output Predictability in the Libgcrypt PRNG http://formal.iti.kit.edu/~klebanov/pubs/libgcrypt-cve-2016-6313.pdf
[ 3 ] GLSA 201610-04
http://security.gentoo.org/glsa/201610-04

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201612-01

Original Source

Url : http://security.gentoo.org/glsa/glsa-201612-01.xml

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-200 Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 75
Application 18
Os 3
Os 1

Nessus® Vulnerability Scanner

Date Description
2018-08-17 Name : The remote PhotonOS host is missing multiple security updates.
File : PhotonOS_PHSA-2017-0013.nasl - Type : ACT_GATHER_INFO
2017-05-01 Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2016-1081.nasl - Type : ACT_GATHER_INFO
2016-12-05 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201612-01.nasl - Type : ACT_GATHER_INFO
2016-11-15 Name : The remote Fedora host is missing a security update.
File : fedora_2016-b66a0aef08.nasl - Type : ACT_GATHER_INFO
2016-11-15 Name : The remote Fedora host is missing a security update.
File : fedora_2016-aab0a156ab.nasl - Type : ACT_GATHER_INFO
2016-11-14 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2016-2674.nasl - Type : ACT_GATHER_INFO
2016-11-09 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20161108_libgcrypt_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2016-11-09 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2016-0156.nasl - Type : ACT_GATHER_INFO
2016-11-08 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2016-2674.nasl - Type : ACT_GATHER_INFO
2016-11-08 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2016-2674.nasl - Type : ACT_GATHER_INFO
2016-10-11 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201610-04.nasl - Type : ACT_GATHER_INFO
2016-10-03 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-1138.nasl - Type : ACT_GATHER_INFO
2016-09-22 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2016-2345-1.nasl - Type : ACT_GATHER_INFO
2016-09-22 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2016-2346-1.nasl - Type : ACT_GATHER_INFO
2016-09-16 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2016-744.nasl - Type : ACT_GATHER_INFO
2016-09-15 Name : The remote Fedora host is missing a security update.
File : fedora_2016-3a0195918f.nasl - Type : ACT_GATHER_INFO
2016-09-08 Name : The remote Fedora host is missing a security update.
File : fedora_2016-2b4ecfa79f.nasl - Type : ACT_GATHER_INFO
2016-09-01 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-1042.nasl - Type : ACT_GATHER_INFO
2016-08-30 Name : The remote Debian host is missing a security update.
File : debian_DLA-602.nasl - Type : ACT_GATHER_INFO
2016-08-29 Name : The remote Fedora host is missing a security update.
File : fedora_2016-9864953aa3.nasl - Type : ACT_GATHER_INFO
2016-08-24 Name : The remote Debian host is missing a security update.
File : debian_DLA-600.nasl - Type : ACT_GATHER_INFO
2016-08-24 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2016-236-02.nasl - Type : ACT_GATHER_INFO
2016-08-24 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2016-236-01.nasl - Type : ACT_GATHER_INFO
2016-08-19 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-3065-1.nasl - Type : ACT_GATHER_INFO
2016-08-19 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-3064-1.nasl - Type : ACT_GATHER_INFO
2016-08-18 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3649.nasl - Type : ACT_GATHER_INFO
2016-08-18 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_e1c71d8d64d911e6b38a25a46b33f2ed.nasl - Type : ACT_GATHER_INFO
2016-08-18 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3650.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2017-07-01 09:25:34
  • Multiple Updates
2016-12-06 13:26:15
  • Multiple Updates
2016-12-02 13:22:58
  • First insertion