|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 1 2003-025: gnupg Vulnerability Assessment Details
|
Fedora Core 1 2003-025: gnupg |
||
Check for the version of the gnupg package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory FEDORA-2003-025 (gnupg). GnuPG (GNU Privacy Guard) is a GNU utility for encrypting data and creating digital signatures. GnuPG has advanced key management capabilities and is compliant with the proposed OpenPGP Internet standard described in RFC2440. Since GnuPG doesn't use any patented algorithm, it is not compatible with any version of PGP2 (PGP2.x uses only IDEA for symmetric-key encryption, which is patented worldwide). Update Information: Phong Nguyen identified a severe bug in the way GnuPG creates and uses ElGamal keys, when those keys are used both to sign and encrypt data. This vulnerability can be used to trivially recover the private key. While the default behavior of GnuPG when generating keys does not lead to the creation of unsafe keys, by overriding the default settings an unsafe key could have been created. If you are using ElGamal keys, you should revoke those keys immediately. The packages included in this update do not make ElGamal keys safe to use they merely include a patch by David Shaw that disables functions that would generate or use ElGamal keys for encryption. Solution : http://www.fedoranews.org/updates/FEDORA-2003-025.shtml Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security |
||
Cables, Connectors |
VoIP IP Phone SIP WAN FV6020 Fanvil Gigabit Office Support IAX IAX2
$35.56
Grandstream GS-HT802 2 Port Analog Telephone Adapter VoIP Phone & Device, Black
$32.00
Cisco 8841 CP-8841-K9 VoIP Business IP Phone (Charcoal)
$49.00
Lot of 2 NEW Cisco CP-7942G IP VoIP Ethernet Desktop Phone #69
$79.99
Cisco CP-7945G VOIP Phone With Stand & Handset Business IP Phone 7945
$3.00
New Cisco 7945G IP VoIP Gigabit GIGE Telephone Phone CP-7945G -
$24.95
Grandstream GXP2100 4 line VoIP SIP Phone - Good Condition - Priced to Sell
$19.95
Cisco 8811-K9 VoIP 8811 Series IP Phone - Charcoal - New in Box
$50.00
Cisco VG202XM Analog Voice Gateway VoIP -- [NEW/FULL KIT]
$76.00
Yealink SIP-T41P PoE Ultra Elegant VoIP Phone
$29.95
|
||
No Discussions have been posted on this vulnerability. |