Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
2019-06-29T17:15:08.627
2024-11-21T04:24:06.410
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | gnupg | gnupg | ≤ 2.2.16 | Yes |
Application | sks_keyserver_project | sks_keyserver | ≤ 1.2.0 | Yes |
Operating System | fedoraproject | fedora | 29 | Yes |
Operating System | fedoraproject | fedora | 30 | Yes |
Operating System | opensuse | leap | 15.0 | Yes |
Operating System | opensuse | leap | 15.1 | Yes |
Application | f5 | traffix_signaling_delivery_controller | ≤ 5.1.0 | Yes |