File-name flaw threatens PGP users
Security-consulting firm Foundstone said that email messages encrypted with the Pretty Good Privacy program can be used as digital bullets to attack and take control of a victim's computer.
Because of a flaw in the way PGP handles long file names in an encrypted archive, an attacker could "take control of the recipient's computer, elevating his or her privileges on the organisation's network," Foundstone said in an advisory.
The company classified the vulnerability as a high risk "due to the trusting nature of encrypted attachments in email, its relative ease of exploitation and the large amount of corporations and military and government agencies that rely on PGP encryption for secure communication."
[ Read more ]
- Article: Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG (14 August 2002)
- Article: PGP Outlook Encryption Plug-in Vulnerability (11 July 2002)
- Article: Attack on Private Signature Keys of the OpenPGP format, PGP programs and other applications compatible with OpenPGP (4 April 2002)