The OpenPGP PGP standard allows an attacker to determine the private signature key via a cryptanalytic attack in which the attacker alters the encrypted private key file and captures a single message signed with the signature key.
References
Configurations
History
20 Nov 2024, 23:35
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2001-017.0.txt - | |
References | () http://archives.neohapsis.com/archives/bugtraq/2001-03/0252.html - Vendor Advisory | |
References | () http://archives.neohapsis.com/archives/bugtraq/2001-03/0274.html - Vendor Advisory | |
References | () http://archives.neohapsis.com/archives/bugtraq/2001-03/0311.html - Vendor Advisory | |
References | () http://www.osvdb.org/11966 - | |
References | () http://www.redhat.com/support/errata/RHSA-2001-063.html - | |
References | () http://www.securityfocus.com/bid/2673 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6558 - |
Information
Published : 2001-06-27 04:00
Updated : 2024-11-20 23:35
NVD link : CVE-2001-0381
Mitre link : CVE-2001-0381
CVE.ORG link : CVE-2001-0381
JSON object : View
Products Affected
pgp
- openpgp
CWE