CVE-2019-13050

Related Vulnerabilities: CVE-2019-13050  

Impact: Important Public Date: 2019-06-29 CWE: CWE-297 Bugzilla: 1726146: CVE-2019-13050 GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

The MITRE CVE dictionary describes this issue as:

Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

Find out more about CVE-2019-13050 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 7.1
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality None
Integrity Impact Low
Availability Impact High

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 8 gnupg2 Under investigation
Red Hat Enterprise Linux 7 gnupg2 Under investigation
Red Hat Enterprise Linux 6 gnupg2 Under investigation
Red Hat Enterprise Linux 5 gnupg Under investigation
Red Hat Enterprise Linux 5 gnupg2 Under investigation

External References