5.8
CVSSv2

CVE-2013-4351

Published: 10/10/2013 Updated: 04/01/2014
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote malicious users to bypass intended cryptographic protection mechanisms by leveraging the subkey.

Vulnerable Product Search on Vulmon Subscribe to Product

gnupg gnupg 1.4.8

gnupg gnupg 1.4.6

gnupg gnupg 1.4.10

gnupg gnupg 1.4.0

gnupg gnupg 1.4.12

gnupg gnupg 1.4.11

gnupg gnupg 1.4.5

gnupg gnupg 1.4.4

gnupg gnupg 1.4.3

gnupg gnupg 1.4.2

gnupg gnupg 1.4.13

gnupg gnupg 2.0.13

gnupg gnupg 2.0.14

gnupg gnupg 2.0.4

gnupg gnupg 2.0.11

gnupg gnupg 2.0.12

gnupg gnupg 2.0.19

gnupg gnupg 2.0.3

gnupg gnupg 2.0

gnupg gnupg 2.0.15

gnupg gnupg 2.0.16

gnupg gnupg 2.0.6

gnupg gnupg 2.0.7

gnupg gnupg 2.0.8

gnupg gnupg 2.0.5

gnupg gnupg 2.0.1

gnupg gnupg 2.0.10

gnupg gnupg 2.0.17

gnupg gnupg 2.0.18

gnupg gnupg 2.1.0

Vendor Advisories

Several security issues were fixed in GnuPG ...
Synopsis Moderate: gnupg security update Type/Severity Security Advisory: Moderate Topic An updated gnupg package that fixes multiple security issues is nowavailable for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerabilit ...
Synopsis Moderate: gnupg2 security update Type/Severity Security Advisory: Moderate Topic An updated gnupg2 package that fixes three security issues is now availablefor Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnera ...
Debian Bug report logs - #725433 CVE-2013-4402: infinite recursion in the compressed packet parser Package: gnupg2; Maintainer for gnupg2 is Debian GnuPG Maintainers <pkg-gnupg-maint@listsaliothdebianorg>; Source for gnupg2 is src:gnupg2 (PTS, buildd, popcon) Reported by: Eric Dorland <eric@debianorg> Date: Sat, ...
Debian Bug report logs - #722722 CVE-2013-4351 gnupg: gpg treats no-usage-permitted keys as all-usages-permitted Package: gnupg; Maintainer for gnupg is Debian GnuPG Maintainers <pkg-gnupg-maint@listsaliothdebianorg>; Source for gnupg is src:gnupg2 (PTS, buildd, popcon) Reported by: Daniel Kahn Gillmor <dkg@fifthhorsem ...
Two vulnerabilities were discovered in GnuPG 2, the GNU privacy guard, a free PGP replacement The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2013-4351 When a key or subkey had its key flags subpacket set to all bits off, GnuPG currently would treat the key as having all bits set That is, where th ...
Two vulnerabilities were discovered in GnuPG, the GNU privacy guard, a free PGP replacement The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2013-4351 When a key or subkey had its key flags subpacket set to all bits off, GnuPG currently would treat the key as having all bits set That is, where the ...
GnuPG 14x, 20x, and 21x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey The compressed packet parser in GnuPG 14x before 1415 and 20x before 2022 ...
GnuPG 14x, 20x, and 21x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey The compressed packet parser in GnuPG 14x before 1415 and 20x before 2022 ...