[PLUG] PGP ADK Vulnerability.

Vik Bajaj on 2000年8月27日 00:19:41 -0400 (EDT)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[PLUG] PGP ADK Vulnerability.


For full advisory, please see:
http://www.vikbajaj.com/security/incident/august-25/
Architectural Vulnerability in PGP ADK Implementation
SANS Global Incident Analysis Center
http://www.sans.org/giac.htm
August 25, 2000
Vik Bajaj <vikbajaj@mit.edu>
Product: NAI PGP versions 5.5 - 6.5.3
Scope: Senders can be tricked into sending encrypted messages readable 
 	 by a third party.
Solution: Download the latest version of PGP or a patch from http://www.pgp.com
 	 (commercial) or http://web.mit.edu/network/pgp.html (freeware). 
	 Alternatively, downgrade to PGP 2, which is not vulnerable.
Summary
-------
A serious architectural vulnerability in all Network Associates Inc. (NAI) 
Version 5 and 6 implementations of Pretty Good Privacy (PGP) has been identified
by Ralf Senderek[1] and confirmed by Bruce Schneier, NAI and others. 
[text deleted]
Acknowledgements
----------------
Chris Brenton <cbrenton@sover.net>
Danielle Thesier <dthesier@med.upenn.edu>
-V.
 
______________________________________________________________________
Philadelphia Linux Users Group - http://www.phillylinux.org
Announcements-http://lists.phillylinux.org/mail/listinfo/plug-announce
General Discussion - http://lists.phillylinux.org/mail/listinfo/plug



AltStyle によって変換されたページ (->オリジナル) /