Vulnerability Details : CVE-2005-0366
The integrity check feature in OpenPGP, when handling a message that was encrypted using cipher feedback (CFB) mode, allows remote attackers to recover part of the plaintext via a chosen-ciphertext attack when the first 2 bytes of a message block are known, and an oracle or other mechanism is available to determine whether an integrity check failed.
Products affected by CVE-2005-0366
- cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-0366
0.64%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-0366
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2005-0366
-
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.Assigned by: nvd@nist.gov (Primary)
References for CVE-2005-0366
-
http://www.securityfocus.com/bid/12529
Third Party Advisory;VDB Entry
-
http://eprint.iacr.org/2005/033.pdf
Technical Description;Third Party Advisory
-
http://www.kb.cert.org/vuls/id/303094
Third Party Advisory;US Government Resource
-
http://www.gentoo.org/security/en/glsa/glsa-200503-29.xml
Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:057
Broken Link
-
http://www.pgp.com/library/ctocorner/openpgp.html
Broken Link
-
http://securitytracker.com/id?1013166
Third Party Advisory;VDB Entry
-
http://eprint.iacr.org/2005/033
Third Party Advisory
-
http://www.novell.com/linux/security/advisories/2005_07_sr.html
Broken Link
Jump to