Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B83822B-BC72-455D-A350-7DC9545E14A9", "versionEndIncluding": "1.5.3", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AE9E5CD-F6F8-4208-ACD2-5E2E88660A01", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "128317AB-E441-47E3-BE5C-86C0D9C267E1", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "5C7509E7-9DF3-42AC-A538-A1BE675253BF", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FAFA68DC-FFA3-4538-8082-93588CCB44D7", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5FEEF3D2-57D5-4E33-8856-B7A859ADD453", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "73E283C1-F1AE-4D29-A683-B5C5503133EC", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7AEF669-B7AA-425A-988A-9F858937EC76", "vulnerable": true}, {"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "67D0DD4C-9A2C-4B41-BA83-E7492EF8D434", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576."}, {"lang": "es", "value": "Libgcrypt anterior a 1.5.4, utilizado en GnuPG y otros productos, no realiza debidamente la normalizaci\u00f3n y aleatorizaci\u00f3n de texto cifrado, lo que facilita a atacantes f\u00edsicamente pr\u00f3ximos realizar ataques de extracci\u00f3n de claves mediante el aprovechamiento de la habilidad de recoger datos de voltaje del metal expuesto, un vector deferente a CVE-2013-4576."}], "id": "CVE-2014-5270", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-10-10T01:55:10.383", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html"}, {"source": "cve@mitre.org", "tags": ["Mailing List", "Third Party Advisory"], "url": "http://openwall.com/lists/oss-security/2014/08/16/2"}, {"source": "cve@mitre.org", "tags": ["Technical Description"], "url": "http://www.cs.tau.ac.il/~tromer/handsoff/"}, {"source": "cve@mitre.org", "url": "http://www.debian.org/security/2014/dsa-3024"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "http://www.debian.org/security/2014/dsa-3073"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List", "Third Party Advisory"], "url": "http://openwall.com/lists/oss-security/2014/08/16/2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Technical Description"], "url": "http://www.cs.tau.ac.il/~tromer/handsoff/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3024"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://www.debian.org/security/2014/dsa-3073"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-200"}], "source": "nvd@nist.gov", "type": "Primary"}]}