Lucene search

K
gentooGentoo FoundationGLSA-200312-05
HistoryDec 12, 2003 - 12:00 a.m.

GnuPG: ElGamal signing keys compromised and format string vulnerability

2003-12-1200:00:00
Gentoo Foundation
security.gentoo.org
25

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.012

Percentile

85.5%

Background

GnuPG is a popular open source signing and encryption tool.

Description

Two flaws have been found in GnuPG 1.2.3.

First, ElGamal signing keys can be compromised. These keys are not commonly used, but this is “a significant security failure which can lead to a compromise of almost all ElGamal keys used for signing. Note that this is a real world vulnerability which will reveal your private key within a few seconds”.

Second, there is a format string flaw in the ‘gpgkeys_hkp’ utility which “would allow a malicious keyserver in the worst case to execute an arbitrary code on the user’s machine.”

Impact

If you have used ElGamal keys for signing your private key can be compromised, and a malicious keyserver could remotely execute arbitrary code with the permissions of the user running gpgkeys_hkp.

Workaround

There is no known workaround at this time.

Resolution

All users who have created ElGamal signing keys should immediately revoke them. In addition, all Gentoo Linux machines with gnupg installed should be updated to use gnupg-1.2.3-r5 or higher:

 # emerge sync
 # emerge -pv '>=app-crypt/gnupg-1.2.3-r5'
 # emerge '>=app-crypt/gnupg-1.2.3-r5'
 # emerge clean
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-crypt/gnupg<= 1.2.3-r4UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.012

Percentile

85.5%