COMMAND
PGP
SYSTEMS AFFECTED
PGP 7.0
PROBLEM
Michael Kjorling found following. Users with write access to
signed exported key blocks may replace them with arbitrary keys
without any warning being issued upon import of those keys
There seems to be a vulnerability in the key import code in PGP
7.0 on the Win32/Intel platform, causing a signature on a full
exported and ASCII armored key block not to be checked when
"Decrypt/Verify" is selected to import the key(s). This means
that any signatures on the full exported key block is not checked,
opening the possibility for anyone who have write access to the
file to replace the keys without having to generate a new
signature. Key signature verification, however, is not affected
by this vulnerability.
Given the possibility to write to the PGP signed file containing
the exported key(s), replace the keys without altering the
signature. PGP will not warn the user upon import of the keys
that the signature has become invalid. Man-in-the-middle attacks
are also a possibility, given an eavesdropper listening on the
communications channel and replacing the key material as it flows
through the wires.
SOLUTION
There is no known workaround, besides always verifying
fingerprints with the owner of the key as well as not trusting
keys that have no or just a few signatures.
Network Associates was contacted by email as per instructions
from their support department on December 20th, 2000.