Improper Validation of Certificate with Host Mismatch
Affecting gnupg2 package, versions *
Report new vulnerabilities
Do your applications use this vulnerable package?
Test your applications
Overview
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
References
CVSS Score
7.5
low severity
-
Attack VectorNetwork
-
Attack ComplexityLow
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityNone
-
IntegrityNone
-
AvailabilityHigh
- CVE
- CVE-2019-13050
- CWE
- CWE-297
- Snyk ID
- SNYK-UBUNTU1804-GNUPG2-453470
- Disclosed
- 29 Jun, 2019
- Published
- 24 Jul, 2019