CVE-2016-6313

Published on: 12/13/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:10 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Certain versions of Ubuntu Linux from Canonical contain the following vulnerability:

The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.

  • CVE-2016-6313 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.3 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED LOW NONE NONE

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
USN-3065-1: Libgcrypt vulnerability | Ubuntu Third Party Advisory
www.ubuntu.com
text/html
URL Logo UBUNTU USN-3065-1
GnuPG: RNG output is predictable (GLSA 201612-01) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201612-01
Debian -- Security Information -- DSA-3650-1 libgcrypt20 Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3650
GnuPG Flaw in Random Number Generator Mixing Functions Lets Users Predict Some Output - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1036635
Vendor Advisory
git.gnupg.org
text/plain
CONFIRM git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS
USN-3064-1: GnuPG vulnerability | Ubuntu Third Party Advisory
www.ubuntu.com
text/html
URL Logo UBUNTU USN-3064-1
Debian -- Security Information -- DSA-3649-1 gnupg Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3649
[Announce] Security fixes for Libgcrypt and GnuPG 1.4 [CVE-2016-6316] Mailing List
Vendor Advisory
lists.gnupg.org
text/html
URL Logo MLIST [gnupg-announce] 20160817 [Announce] Security fixes for Libgcrypt and GnuPG 1.4 [CVE-2016-6316]
libgcrypt: Multiple vulnerabilities (GLSA 201610-04) — Gentoo Security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201610-04
GnuPG and Libgcrypt CVE-2016-6313 Local Predictable Random Number Generator Weakness Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 92527
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2674

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux16.04AllAllAll
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux16.04AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
ApplicationGnupgGnupgAllAllAllAll
ApplicationGnupgLibgcrypt1.6.0AllAllAll
ApplicationGnupgLibgcrypt1.6.1AllAllAll
ApplicationGnupgLibgcrypt1.6.2AllAllAll
ApplicationGnupgLibgcrypt1.6.3AllAllAll
ApplicationGnupgLibgcrypt1.6.4AllAllAll
ApplicationGnupgLibgcrypt1.6.5AllAllAll
ApplicationGnupgLibgcrypt1.7.0AllAllAll
ApplicationGnupgLibgcrypt1.7.1AllAllAll
ApplicationGnupgLibgcrypt1.7.2AllAllAll
ApplicationGnupgLibgcrypt1.6.0AllAllAll
ApplicationGnupgLibgcrypt1.6.1AllAllAll
ApplicationGnupgLibgcrypt1.6.2AllAllAll
ApplicationGnupgLibgcrypt1.6.3AllAllAll
ApplicationGnupgLibgcrypt1.6.4AllAllAll
ApplicationGnupgLibgcrypt1.6.5AllAllAll
ApplicationGnupgLibgcrypt1.7.0AllAllAll
ApplicationGnupgLibgcrypt1.7.1AllAllAll
ApplicationGnupgLibgcrypt1.7.2AllAllAll
ApplicationGnupgLibgcryptAllAllAllAll
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.6.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.6.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.6.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.6.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.6.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.6.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.7.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.7.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.7.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.6.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.6.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.6.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.6.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.6.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.6.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.7.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.7.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:1.7.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*: