Overview
A vulnerability in OpenPGP may allow attackers to recover partial plaintexts from OpenPGP messages that use symmetric encryption.
Description
A vulnerability in OpenPGP can be used by attackers to recover partial plaintexts from messages employing symmetric encryption. Researchers Serge Mister and Robert Zuccherato of Entrust have developed a chosen-ciphertext attack method that can be used against OpenPGP messages encrypted using cipher feedback (CFB) mode. The attack takes advantage of an integrity check feature that is intended to save time by aborting futile and possibly lengthy decryption attempts. Preconditions |
Impact
Attackers may be able to recover partial plaintexts from OpenPGP messages that use symmetric encryption. |
Solution
Apply a patch from your vendor |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was discovered by Serge Mister and Robert Zuccherato of Entrust.
This document was written by Jeffrey P. Lanza and Will Dormann.
Other Information
CVE IDs: | CVE-2005-0366 |
Severity Metric: | 3.07 |
Date Public: | 2005-02-10 |
Date First Published: | 2005-02-11 |
Date Last Updated: | 2005-05-23 13:38 UTC |
Document Revision: | 25 |