Skip the navigation

Security hole found in open-source encryption program

Gnu Privacy Guard is a version of the PGP encryption program

By James Niccolai
March 13, 2006 12:00 PM ET

IDG News Service - Developers of the open-source GnuPG encryption software have reported a security flaw that could allow an attacker to sneak malicious code into a signed e-mail message.

GnuPG, or Gnu Privacy Guard, is an open-source version of the PGP encryption program used to encrypt data and creating digital signatures. It's included with several versions of Linux as well as FreeBSD, and is also used widely used by the IT security industry.

The vulnerability allows an attacker to take a signed message and insert additional code, which then appears to the recipient as if it were part of the digitally signed content.

"Someone who's able to intercept the message as it's transmitted could inject some data, and then the person who verifies the signature would be told it's a valid, unaltered message," said Thomas Kristensen, chief technology officer at security vendor Secunia in Copenhagen.

"That's one of the main purposes of the program, so it's quite significant," he added.

The attacker could potentially alter a text file, like a business contract, or an executable file attached to the message, he said. Secunia ranked the flaw as "moderately critical."

It affects all versions of GnuPG prior to, and users are advised to upgrade at once to that release. More information is on the GnuPG Web site.

The GnuPG team uncovered the flaw while testing the patch for a previous vulnerability reported last month. That flaw could have led to false positives when verifying signature files. Upgrading to the release fixes that problem as well, the group said.

GnuPG is "fairly widely used among certain communities," although most people today probably use the encryption features in Microsoft Windows, Kristensen said.

The two recent security holes are unlikely to damage GnuPG's credibility, he said.

"People know it's still sound in the way it was designed and programmed, most people would consider this a minor oversight that's been corrected in a way you'd expect from a serious open-source project like GPG," Kristensen said.

Reprinted with permission from Story copyright 2014 International Data Group. All rights reserved.
Our Commenting Policies
Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!