Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-11841

Опубликовано: 22 мая 2019
Источник: ubuntu
Приоритет: medium
CVSS2: 4.3
CVSS3: 5.9

Описание

A message-forgery issue was discovered in crypto/openpgp/clearsign/clearsign.go in supplementary Go cryptography libraries 2019-03-25. According to the OpenPGP Message Format specification in RFC 4880 chapter 7, a cleartext signed message can contain one or more optional "Hash" Armor Headers. The "Hash" Armor Header specifies the message digest algorithm(s) used for the signature. However, the Go clearsign package ignores the value of this header, which allows an attacker to spoof it. Consequently, an attacker can lead a victim to believe the signature was generated using a different message digest algorithm than what was actually used. Moreover, since the library skips Armor Header parsing in general, an attacker can not only embed arbitrary Armor Headers, but also prepend arbitrary text to cleartext messages without invalidating the signatures.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

1:0.0~git20200221.2aa609c-1
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

needed

esm-apps/focal

not-affected

1:0.0~git20200221.2aa609c-1
esm-apps/jammy

not-affected

1:0.0~git20200221.2aa609c-1
esm-apps/noble

not-affected

1:0.0~git20200221.2aa609c-1
esm-infra-legacy/trusty

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

code-not-present
cosmic

not-affected

code-not-present
devel

not-affected

code-not-present
disco

not-affected

code-not-present
eoan

not-affected

code-not-present
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

code-not-present
esm-infra/focal

not-affected

code-not-present
esm-infra/xenial

not-affected

code-not-present
focal

not-affected

code-not-present

Показывать по

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
больше 6 лет назад

A message-forgery issue was discovered in crypto/openpgp/clearsign/clearsign.go in supplementary Go cryptography libraries 2019-03-25. According to the OpenPGP Message Format specification in RFC 4880 chapter 7, a cleartext signed message can contain one or more optional "Hash" Armor Headers. The "Hash" Armor Header specifies the message digest algorithm(s) used for the signature. However, the Go clearsign package ignores the value of this header, which allows an attacker to spoof it. Consequently, an attacker can lead a victim to believe the signature was generated using a different message digest algorithm than what was actually used. Moreover, since the library skips Armor Header parsing in general, an attacker can not only embed arbitrary Armor Headers, but also prepend arbitrary text to cleartext messages without invalidating the signatures.

CVSS3: 5.9
debian
больше 6 лет назад

A message-forgery issue was discovered in crypto/openpgp/clearsign/cle ...

CVSS3: 5.9
github
больше 3 лет назад

Golang/x/crypto message forgery vulnerability

4.3 Medium

CVSS2

5.9 Medium

CVSS3