|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2003:109: gnupg Vulnerability Assessment Details
|
MDKSA-2003:109: gnupg |
||
Check for the version of the gnupg package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory MDKSA-2003:109 (gnupg). A severe vulnerability was discovered in GnuPG by Phong Nguyen relating to ElGamal sign+encrypt keys. From Werner Koch's email message: 'Phong Nguyen identified a severe bug in the way GnuPG creates and uses ElGamal keys for signing. This is a significant security failure which can lead to a compromise of almost all ElGamal keys used for signing. Note that this is a real world vulnerability which will reveal your private key within a few seconds. Please *take immediate action and revoke your ElGamal signing keys*. Furthermore you should take whatever measures necessary to limit the damage done for signed or encrypted documents using that key.' And also: 'Note that the standard keys as generated by GnuPG (DSA and ElGamal encryption) as well as RSA keys are NOT vulnerable. Note also that ElGamal signing keys cannot be generated without the use of a special flag to enable hidden options and even then overriding a warning message about this key type. See below for details on how to identify vulnerable keys.' MandrakeSoft urges any users who use the ElGamal sign+encrypt keys to immediately revoke these keys and discontinue use of them. Updated packages are provided that remove the ability to create these keys and to create signatures using these keys (thanks to David Shaw for writing the patch). Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:109 Network Security Threat Level: High Networks Security ID: 9115 Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security |
||
Cables, Connectors |
HPE BL460c G9 ProLiant Blade | 2x Xeon E5-2620V3 | NO RAM | P244BR | 2xHDD Tray
$179.00
Dell PowerEdge FX2 FX2S Enclosure - 4x PowerEdge FC640 w/ 8x Gold 6132 112C 1TB
$2699.99
Dell PowerEdge M1000E Server Xeon Fully Loaded with M820 E5-4620 & 2,528GB RAM
$500.00
HP ProLiant BL460c G9 (Gen9) 2x E5-2670V3 12 Core 3.1GHz No Ram or No Drives
$59.98
Dell PowerEdge M620 0F9HJC Blade Server 2*E5-2670 2.60GHz 192GB RAM 2*300GB SAS
$103.99
Dell PowerEdge M640 Blade Server 2x Gold 6138 CPUS 40 Cores 3.70GHz Turbo
$649.99
DELL PEM640 POWEREDGE M640 BLADE SERVER
$539.95
DELL M630 BLADE SERVER x2 XEON E5-2660V3 @ 2.6GH H730 PERC HDD CADDIES 16GB FC
$50.00
HP ProLiant BL460c G9(Gen9) 2x 10 CORE E5-2660v3 2.6GHz 128GB RAM No SSD
$222.00
HP ProLiant BL460c Gen9 Blade 2x E5-2660v4 2.0GHz =28 Cores 128GB P246 650FLB
$286.00
|
||
No Discussions have been posted on this vulnerability. |