A cryptographic issue in OpenPGP.js <=4.2.0 allows an attacker who is able provide forged messages and gain feedback about whether decryption of these messages succeeded to conduct an invalid curve attack in order to gain the victim's ECDH private key.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html | Third Party Advisory VDB Entry |
https://github.com/openpgpjs/openpgpjs/pull/853 | Third Party Advisory |
https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e | Patch Third Party Advisory |
https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0 | Release Notes |
https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/ | Exploit Third Party Advisory |
https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-08-22T15:48:57
Updated: 2019-08-22T21:06:11
Reserved: 2019-02-25T00:00:00
Link: CVE-2019-9155
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-08-22T16:15:10.540
Modified: 2021-07-21T11:39:23.747
Link: CVE-2019-9155
JSON object: View
Redhat Information
No data.
CWE