Security hole found in open-source encryption program
Gnu Privacy Guard is a version of the PGP encryption program
IDG News Service - Developers of the open-source GnuPG encryption software have reported a security flaw that could allow an attacker to sneak malicious code into a signed e-mail message.
GnuPG, or Gnu Privacy Guard, is an open-source version of the PGP encryption program used to encrypt data and creating digital signatures. It's included with several versions of Linux as well as FreeBSD, and is also used widely used by the IT security industry.
The vulnerability allows an attacker to take a signed message and insert additional code, which then appears to the recipient as if it were part of the digitally signed content.
"Someone who's able to intercept the message as it's transmitted could inject some data, and then the person who verifies the signature would be told it's a valid, unaltered message," said Thomas Kristensen, chief technology officer at security vendor Secunia in Copenhagen.
"That's one of the main purposes of the program, so it's quite significant," he added.
The attacker could potentially alter a text file, like a business contract, or an executable file attached to the message, he said. Secunia ranked the flaw as "moderately critical."
It affects all versions of GnuPG prior to 188.8.131.52, and users are advised to upgrade at once to that release. More information is on the GnuPG Web site.
The GnuPG team uncovered the flaw while testing the patch for a previous vulnerability reported last month. That flaw could have led to false positives when verifying signature files. Upgrading to the 184.108.40.206 release fixes that problem as well, the group said.
GnuPG is "fairly widely used among certain communities," although most people today probably use the encryption features in Microsoft Windows, Kristensen said.
The two recent security holes are unlikely to damage GnuPG's credibility, he said.
"People know it's still sound in the way it was designed and programmed, most people would consider this a minor oversight that's been corrected in a way you'd expect from a serious open-source project like GPG," Kristensen said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts