First published: Fri Feb 11 2005(Updated: )
The integrity check feature in OpenPGP, when handling a message that was encrypted using cipher feedback (CFB) mode, allows remote attackers to recover part of the plaintext via a chosen-ciphertext attack when the first 2 bytes of a message block are known, and an oracle or other mechanism is available to determine whether an integrity check failed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GnuPG | <1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0366 is considered a high severity vulnerability due to its potential to allow remote attackers to recover plaintext data.
To fix CVE-2005-0366, upgrade to a version of GnuPG newer than 1.4.1 that addresses this vulnerability.
CVE-2005-0366 allows attackers to perform a chosen-ciphertext attack to recover part of the plaintext of encrypted messages.
CVE-2005-0366 affects GnuPG versions up to but not including 1.4.1.
CVE-2005-0366 is caused by weaknesses in the integrity check feature when handling messages encrypted with cipher feedback mode.