Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.105555
Category:F5 Local Security Checks
Title:F5 BIG-IP - GnuPG vulnerability CVE-2013-4351
Summary:The remote host is missing a security patch.
Description:Summary:
The remote host is missing a security patch.

Vulnerability Insight:
GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.

Vulnerability Impact:
A remote attacker may exploit this flaw to bypass the intended cryptographic protection mechanism.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-4351
DSA-2773
http://www.debian.org/security/2013/dsa-2773
DSA-2774
http://www.debian.org/security/2013/dsa-2774
RHSA-2013:1459
http://rhn.redhat.com/errata/RHSA-2013-1459.html
USN-1987-1
http://ubuntu.com/usn/usn-1987-1
[oss-security] 20130913 Re: GnuPG treats no-usage-permitted keys as all-usages-permitted
http://www.openwall.com/lists/oss-security/2013/09/13/4
http://thread.gmane.org/gmane.comp.encryption.gpg.devel/17712/focus=18138
https://bugzilla.redhat.com/show_bug.cgi?id=1010137
openSUSE-SU-2013:1526
http://lists.opensuse.org/opensuse-updates/2013-10/msg00003.html
openSUSE-SU-2013:1532
http://lists.opensuse.org/opensuse-updates/2013-10/msg00006.html
CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.