Lucene search

K
freebsdFreeBSD8375A73F-01BF-11DA-BC08-0001020EED82
HistoryFeb 08, 2005 - 12:00 a.m.

gnupg -- OpenPGP symmetric encryption vulnerability

2005-02-0800:00:00
vuxml.freebsd.org
18

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.006

Percentile

78.4%

Serge Mister and Robert Zuccherato reports that the OpenPGP
protocol is vulnerable to a cryptographic attack when using
symmetric encryption in an automated way.
David Shaw reports about the impact:

This attack, while very significant from a cryptographic
point of view, is not generally effective in the real
world. To be specific, unless you have your OpenPGP
program set up as part of an automated system to accept
encrypted messages, decrypt them, and then provide a
response to the submitter, then this does not affect you
at all.

Note that the fix in GnuPG does note completely
eliminate the potential problem:

These patches disable a portion of the OpenPGP protocol
that the attack is exploiting. This change should not be
user visible. With the patch in place, this attack will
not work using a public-key encrypted message. It will
still work using a passphrase-encrypted message.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchgnupg< 1.4.1UNKNOWN
FreeBSDanynoarchp5-crypt-openpgp<= 1.03UNKNOWN
FreeBSDanynoarchpgp= 3.0UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.006

Percentile

78.4%