Vulnerability Name:

CCN-9849

Published:2002-08-12
Updated:2002-08-12
Summary:OpenPGP is an open-source security format that uses public/private keys to encrypt, sign, and decrypt messages. Programs that use the OpenPGP format, including PGP and GNU Privacy Guard (GnuPG or GPG) could possibly allow a remote attacker to obtain portions of encrypted messages using a "chosen-ciphertext" attack. A remote attacker could send a specially-crafted message to a user who is using one of the affected encryption programs, and convince this user to decrypt the message, which could possibly allow the attacker to recover portions of the original message.

Note: Refer to the Counterpane Internet Security, Inc. paper: "Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG" for more information. See References.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: BugTraq Mailing List, Mon Aug 12 2002 - 12:45:26 CDT
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG

Source: CCN
Type: Counterpane Internet Security, Inc. Web site
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG

Source: CCN
Type: BID-5446
PGP / GnuPG Chosen Ciphertext Message Disclosure Vulnerability

Source: XF
Type: UNKNOWN
openpgp-ciphertext-message-disclosure(9849)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:gnu:privacy_guard:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:pgp:freeware:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:pgp:personal_privacy:6.5.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    gnu privacy guard 1.0
    gnu privacy guard 1.0.1
    gnu privacy guard 1.0.2
    gnu privacy guard 1.0.3
    gnu privacy guard 1.0.4
    gnu privacy guard 1.0.5
    pgp freeware 7.0.3
    gnu privacy guard 1.0.6
    gnu privacy guard 1.0.7
    pgp personal privacy 6.5.3