{
  "threat_severity" : "Moderate",
  "public_date" : "2016-08-17T00:00:00Z",
  "bugzilla" : {
    "description" : "libgcrypt: PRNG output is predictable",
    "id" : "1366105",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1366105"
  },
  "cvss" : {
    "cvss_base_score" : "4.0",
    "cvss_scoring_vector" : "AV:N/AC:H/Au:N/C:P/I:P/A:N",
    "status" : "verified"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.8",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
    "status" : "verified"
  },
  "details" : [ "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.", "A design flaw was found in the libgcrypt PRNG (Pseudo-Random Number Generator). An attacker able to obtain the first 580 bytes of the PRNG output could predict the following 20 bytes." ],
  "acknowledgement" : "Red Hat would like to thank Felix Dörre and Vladimir Klebanov for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2016-11-08T00:00:00Z",
    "advisory" : "RHSA-2016:2674",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "libgcrypt-0:1.4.5-12.el6_8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2016-11-08T00:00:00Z",
    "advisory" : "RHSA-2016:2674",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "libgcrypt-0:1.5.3-13.el7_3.1"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "libgcrypt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2016-6313\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-6313\nhttps://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html" ],
  "name" : "CVE-2016-6313",
  "csaw" : false
}