cpe:/a:gnupg:libgcrypt:1.8.2 CVE-2018-6829 2018-02-07T18:29:01.703-05:00 2019-10-02T20:03:26.223-04:00 5.0 NETWORK LOW NONE PARTIAL NONE NONE http://nvd.nist.gov 2018-02-28T09:33:07.600-05:00 MISC https://github.com/weikengchen/attack-on-libgcrypt-elgamal MISC https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki MISC https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.