Friday, May 14, 2021

‘Pretty Good’ Isn’t Good Enough

Network security firm Foundstone said Thursday that it had discovered a
significant security vulnerability in PGP, the de facto commercial
encryption software.

The flaw stems from an overflow that allows the attacker to take control of
the recipient’s computer, elevating his or her privileges on the
organization’s network

According to the firm, the vulnerability could have very wide spread effects
due to the trusting nature of encrypted attachments in e-mail, its relative
ease of exploitation and the large amount of corporations, military and
government agencies that rely on PGP encryption for secure communication.

The flaw, which Foundstone believes could be easily exploited, affects PGP
Corporate Edition 7.1.0 and 7.1.1. Software maker.

The attack works by encrypting a file with a public key
and sending it to a recipient. Given the trusting nature of public key
encryption, the recipient would look at the encrypted file and attempt to
decrypt it. However, the act of decrypting the file may also allow arbitrary
code to be run on the host.

The attack is effective because PGP does not properly check the length of
the filename. An attacker could create an encrypted document and send it to
a recipient who trusts the source of the message. As the recipient decrypts
the message, the file length will cause a PGP overflow and the software to
crash, allowing the attacker to take control of the computer and possibly
gain access to sensitive or confidential information on the network.

PGP has issued a fix for this vulnerability, available here.

PGP, which stands for “pretty good privacy,” was developed as a freeware
program by Phil Zimmerman in the early 90s to provide secure e-mail and file
storage using a public key system, and in the past decade, has become the
standard for e-mail encryption.

This is not the first time PGP has come under scrutiny for security threats. Initially, in the early 90’s when the software came out, the U.S. military
believed PGP’s security threat was to the nation itself. On Feb. 17, 1993,
the government threatened to prosecute its creator for “illegal trafficking
in munitions,” as U.S. export regulations classify all encryption devices as
“munitions,” military weapons.

Now, the focus has come on vulnerabilities as the software, bought in 1997
by Network Associates , and recently sold to
start-up firm PGA Corp., has had numerous flaws recently.

Last month a flaw was discovered that could allow an attacker to view sensitive
information
contained in emails, and in July, a flaw was discovered
in a PGP plug-in for Outlook which also allows an attacker to take over a
users computer.

Similar articles

Latest Articles

Database-Tuning Platform Launches and...

PITTSBURGH — A team out of Carnegie Mellon University is launching its automatic database-tuning product today with the help of $2.5 million in funding.   OtterTune,...

Top 10 Professional Services...

Professional services automation (PSA) software aims to offer service-based companies most of the software they will need to run their businesses in one package....

What is Data Aggregation?

Data aggregation is the process where raw data is gathered and presented in a summarized format for statistical analysis. The data may be gathered...

Dell APEX: Our...

One of the missteps IBM made last century was collapsing their sales model, which was services based, to generate a short-term revenue spike. Up...