Vulnerabilidad en el protocolo Open PGP
|
Vulnerability classification
|
Property |
Value |
Confidence level |
Oficial |
Impact |
Integridad |
Dificulty |
Experto |
Required attacker level |
Acceso remoto con cuenta |
System information
|
Property |
Value |
Affected manufacturer |
GNU/Linux |
Affected software |
Open PGP |
Description
|
Se ha descubierto una vulnerabilidad en el protocolo Open PGP. La vulnerabilidad reside en que el protocolo es vulnerable a un ataque de tiempo que permite obtener el texto plano desde un texto cifrado.
Esta vulnerabilidad es únicamente explotable en sistemas que aceptan una cantidad arbitraria de texto cifrada para descifrarla automáticamente. |
Solution
|
Actualización de software
SUSE Linux (gpg)
Actualizar mediante YaST Online Update
Mandrake Linux
Mandrakelinux 9.2
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/gnupg-1.2.3-3.2.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/gnupg-1.2.3-3.2.92mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/gnupg-1.2.3-3.2.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/gnupg-1.2.3-3.2.92mdk.src.rpm
Mandrakelinux 10.0
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/gnupg-1.2.4-1.1.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/gnupg-1.2.4-1.1.100mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/gnupg-1.2.4-1.1.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/gnupg-1.2.4-1.1.100mdk.src.rpm
Mandrakelinux 10.1
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/gnupg-1.2.4-1.1.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/gnupg-1.2.4-1.1.101mdk.src.rpm
x86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/gnupg-1.2.4-1.1.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/gnupg-1.2.4-1.1.101mdk.src.rpm
Corporate Server 2.1
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/gnupg-1.0.7-3.3.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/gnupg-1.0.7-3.3.C21mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/gnupg-1.0.7-3.3.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/gnupg-1.0.7-3.3.C21mdk.src.rpm
Corporate Server 3.0
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/gnupg-1.2.4-1.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/gnupg-1.2.4-1.1.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/gnupg-1.2.4-1.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/gnupg-1.2.4-1.1.C30mdk.src.rpm |
Standar resources
|
Property |
Value |
CVE |
CAN-2005-0366 |
BID |
NULL |
Other resources
|
Open PGP Flaw
http://www.pgp.com/library/ctocorner/openpgp.html
Mandrakesoft Security Advisories MDKSA-2005:057
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:057 |
Version history
|
Version |
Comments |
Date |
1.0
|
Aviso emitido
|
2005-03-07
|
1.1
|
Aviso emitido por Mandrake (MDKSA-2005:057)
|
2005-03-16
|