Article 3SADG Decades-old PGP bug allowed hackers to spoof just about anyone’s signature

Decades-old PGP bug allowed hackers to spoof just about anyone’s signature

by
Dan Goodin
from Ars Technica - All content on (#3SADG)
not-signed-nor-encrypted-800x513.png

Enlarge (credit: Marcus Brinkmann)

For their entire existence, some of the world's most widely used email encryption tools have been vulnerable to hacks that allowed attackers to spoof the digital signature of just about any person with a public key, a researcher said Wednesday. GnuPG, Enigmail, GPGTools, and python-gnupg have all been updated to patch the critical vulnerability. Enigmail and the Simple Password Store have also received patches for two related spoofing bugs.

Digital signatures are used to prove the source of an encrypted message, data backup, or software update. Typically, the source must use a private encryption key to cause an application to show that a message or file is signed. But a series of vulnerabilities dubbed SigSpoof makes it possible in certain cases for attackers to fake signatures with nothing more than someone's public key or key ID, both of which are often published online. The spoofed email shown at the top of this post can't be detected as malicious without doing forensic analysis that's beyond the ability of many users.

Backups and software updates affected, too

The flaw, indexed as CVE-2018-12020, means that decades' worth of email messages many people relied on for sensitive business or security matters may have in fact been spoofs. It also has the potential to affect uses that went well beyond encrypted email.

Read 8 remaining paragraphs | Comments

index?i=gZ6-YGacYFw:tQmC_RMYN5M:V_sGLiPB index?i=gZ6-YGacYFw:tQmC_RMYN5M:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments