Impact: Important Public Date: 2019-06-29 CWE: CWE-297 Bugzilla: 1726146: CVE-2019-13050 GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2019-13050 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 7.1 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity Impact | Low |
Availability Impact | High |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 8 | gnupg2 | Under investigation |
Red Hat Enterprise Linux 7 | gnupg2 | Under investigation |
Red Hat Enterprise Linux 6 | gnupg2 | Under investigation |
Red Hat Enterprise Linux 5 | gnupg | Under investigation |
Red Hat Enterprise Linux 5 | gnupg2 | Under investigation |