First published: Wed May 22 2019(Updated: )
A message-forgery issue was discovered in `crypto/openpgp/clearsign/clearsign.go` in supplementary Go cryptography libraries 2019-03-25. According to the OpenPGP Message Format specification in RFC 4880 chapter 7, a cleartext signed message can contain one or more optional "Hash" Armor Headers. The "Hash" Armor Header specifies the message digest algorithm(s) used for the signature. However, the Go clearsign package ignores the value of this header, which allows an attacker to spoof it. Consequently, an attacker can lead a victim to believe the signature was generated using a different message digest algorithm than what was actually used. Moreover, since the library skips Armor Header parsing in general, an attacker can not only embed arbitrary Armor Headers, but also prepend arbitrary text to cleartext messages without invalidating the signatures.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/golang.org/x/crypto | <0.0.0-20190424203555-c05e17bb3b2d | 0.0.0-20190424203555-c05e17bb3b2d |
golang.org/x/crypto | =2019-03-25 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11841 has a severity rating that reflects a message-forgery vulnerability in the cryptography library.
To fix CVE-2019-11841, upgrade to the patched version of golang.org/x/crypto available after 0.0.0-20190424203555-c05e17bb3b2d.
CVE-2019-11841 affects specific versions of the Go cryptography library, Debian 8.0, and Debian 9.0.
CVE-2019-11841 is classified as a message-forgery issue within the OpenPGP implementation.
There are no public reports indicating that CVE-2019-11841 is currently being actively exploited.