First published: Thu May 24 2001(Updated: )
The split key mechanism used by PGP 7.0 allows a key share holder to obtain access to the entire key by setting the "Cache passphrase while logged on" option and capturing the passphrases of other share holders as they authenticate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PGP OpenPGP | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0435 is classified as a high-severity vulnerability due to the potential compromise of cryptographic keys.
To mitigate CVE-2001-0435, avoid using the 'Cache passphrase while logged on' option in PGP 7.0.
Users of PGP 7.0 that utilize the split key mechanism are affected by CVE-2001-0435.
CVE-2001-0435 can be exploited through passphrase capturing by a malicious key share holder.
There is no specific patch for CVE-2001-0435, but users should upgrade to newer versions of PGP for better security.