Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2003:109: gnupg


Vulnerability Assessment Details

MDKSA-2003:109: gnupg

Vulnerability Assessment Summary
Check for the version of the gnupg package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2003:109 (gnupg).


A severe vulnerability was discovered in GnuPG by Phong Nguyen relating to
ElGamal sign+encrypt keys. From Werner Koch's email message:
'Phong Nguyen identified a severe bug in the way GnuPG creates and uses ElGamal
keys for signing. This is a significant security failure which can lead to a
compromise of almost all ElGamal keys used for signing. Note that this is a real
world vulnerability which will reveal your private key within a few seconds.
Please *take immediate action and revoke your ElGamal signing keys*. Furthermore
you should take whatever measures necessary to limit the damage done for signed
or encrypted documents using that key.'
And also:
'Note that the standard keys as generated by GnuPG (DSA and ElGamal encryption)
as well as RSA keys are NOT vulnerable. Note also that ElGamal signing keys
cannot be generated without the use of a special flag to enable hidden options
and even then overriding a warning message about this key type. See below for
details on how to identify vulnerable keys.'
MandrakeSoft urges any users who use the ElGamal sign+encrypt keys to
immediately revoke these keys and discontinue use of them. Updated packages are
provided that remove the ability to create these keys and to create signatures
using these keys (thanks to David Shaw for writing the patch).


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:109
Network Security Threat Level: High

Networks Security ID: 9115

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors


ALLEN BRADLEY 281G-F12S-10B-RRG-CBG /C  AMORSTART MODULE 280G-FS-10-RG STK 2911 picture

ALLEN BRADLEY 281G-F12S-10B-RRG-CBG /C AMORSTART MODULE 280G-FS-10-RG STK 2911

$380.00



Intel - Core i7-12700K Desktop Processor 12 (8P+4E) Cores up to 5.0 GHz Unloc... picture

Intel - Core i7-12700K Desktop Processor 12 (8P+4E) Cores up to 5.0 GHz Unloc...

$419.99



AMD Ryzen 9 5950X 16-core 32-thread Desktop Processor picture

AMD Ryzen 9 5950X 16-core 32-thread Desktop Processor

$319.99



Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc... picture

Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc...

$619.99



Intel Core i7-6700 3.40 GHz QUAD Core (4 Core) Desktop Processor 8MB LGA 1151 picture

Intel Core i7-6700 3.40 GHz QUAD Core (4 Core) Desktop Processor 8MB LGA 1151

$59.99



Intel Core i7-6700 SR2L2 4.00 GHz LGA 1151 Quad-Core Processor picture

Intel Core i7-6700 SR2L2 4.00 GHz LGA 1151 Quad-Core Processor

$58.00



Intel Core i7-14700K Unlocked Desktop Processor picture

Intel Core i7-14700K Unlocked Desktop Processor

$409.99



Intel Xeon Gold 6126 2.6 GHz LGA 3647 Server CPU Processor SR3B3 picture

Intel Xeon Gold 6126 2.6 GHz LGA 3647 Server CPU Processor SR3B3

$17.99



Intel i7-8700 Coffee Lake 3.2GHz 6-Core Max Turbo 4.6GHz Processor picture

Intel i7-8700 Coffee Lake 3.2GHz 6-Core Max Turbo 4.6GHz Processor

$49.01



Intel Core i7-13700K 3.40GHz 16-Core CPU LGA1700 BX8071513700K picture

Intel Core i7-13700K 3.40GHz 16-Core CPU LGA1700 BX8071513700K

$339.99



Discussions

No Discussions have been posted on this vulnerability.