5
CVSSv2

CVE-2019-14855

Published: 20/03/2020 Updated: 08/11/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions prior to 2.2.18.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnupg gnupg

fedoraproject fedora 30

fedoraproject fedora 31

canonical ubuntu linux 18.04

Vendor Advisories

Debian Bug report logs - #945859 gnupg2: CVE-2019-14855: Web of Trust forgeries using collisions in SHA-1 signatures Package: src:gnupg2; Maintainer for src:gnupg2 is Debian GnuPG Maintainers <pkg-gnupg-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 29 Nov 2019 23:24:0 ...

Github Repositories

Chosen-Prefix Collision Attack Against SHA-1 Hash Function

We have computed the very first chosen-prefix collision for SHA-1 In a nutshell, this means a complete and practical break of the SHA-1 hash function, with dangerous practical implications if you are still using this hash function To put it in another way: all attacks that are practical on MD5 are now also practical on SHA-1 Check our paper here for more details Slides fr