ad info

 
CNN.com  technology > computing
    Editions | myCNN | Video | Audio | Headline News Brief | Feedback  

 

  Search
 
 

 
TECHNOLOGY
TOP STORIES

Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

(MORE)

TOP STORIES

More than 11,000 killed in India quake

Mideast negotiators want to continue talks after Israeli elections

(MORE)

MARKETS
4:30pm ET, 4/16
144.70
8257.60
3.71
1394.72
10.90
879.91
 


WORLD

U.S.

POLITICS

LAW

ENTERTAINMENT

HEALTH

TRAVEL

FOOD

ARTS & STYLE



(MORE HEADLINES)
*
 
CNN Websites
Networks image


Security flaw discovered in Network Associates PGP software

Network World Fusion

(IDG) -- European cryptographic researchers have uncovered a serious security flaw in both the Unix and Windows versions of Network Associates PGP software 5.5 through 6.5.3 - a flaw that allows a savvy attacker to alter the victim's PGP public certificate and read any message encrypted with the altered certificate.

A certificate is software that unites the user's identity with a set of encryption keys and is used for signing, encrypting and decrypting messages.

European researchers Ralf Senderek and Stephen Early disclosed their findings in a paper published Thursday online.

  MESSAGE BOARD
 
  ALSO
 

Network Associates acknowledged the paper's findings, emphasizing that the company is working on a software patch to prevent any attacker from exploiting this flaw.

"To our knowledge, no customer data has been compromised," says Mike Wallach, president of PGP Security.

Network Associates executives originally wanted to make the software fix for PGP available Thursday, but they now say it will be available for download from PGP.com by 5 p.m. Friday.

The flaw centers on the way that PGP implements a so-called "data-recovery" feature that lets an authorized third party gain access to data encrypted with the user's PGP certificate.

"The issue is an attacker can add an additional key to the user's public-key certificate to be used as an additional decryption key," acknowledges Mike Jones, PGP business line manager at Network Associates.

MORE COMPUTING INTELLIGENCE
IDG.net   IDG.net home page
  Network World Fusion home page
  Free Network World Fusion newsletters
  Security, the way it should be
  Should you encode your e-mail?
  Reviews & in-depth info at IDG.net
  E-BusinessWorld
  TechInformer
  Questions about computers? Let IDG.net's editors help you
  Subscribe to IDG.net's free daily newsletter for network experts
  Search IDG.net in 12 languages
  News Radio
  * Fusion audio primers
  * Computerworld Minute

As it turns out, this flaw has actually existed since 1997, back when Phil Zimmermann, the original developer of PGP, added the data-recovery feature as he sought to commercialize the product for corporate use, Jones points out. As a safety measure, corporations want to have a way to decrypt data that their employees encrypt, Jones notes.

At the time, the federal government was also pushing hard to get companies to add so-called "key escrow" type technologies to their encryption products so that law enforcement could obtain access to encrypted data on demand.

Network Associates bought PGP in December 1997. The three-year-old flaw, not publicized until Thursday, lets an attacker decrypt PGP data but does not let the attacker impersonate the PGP certificate holder, Jones emphasizes.

Network Associates has taken offline a central server in Santa Clara, Calif., containing PGP public-key certificates until the problem is resolved, which should occur by tomorrow morning.

The patch that Network Associates expects to soon release will correct two problems. It will prevent any additional decryption keys from being added to any field in the PGP certificate. And it will also work to verify where additional decryption keys came from to ensure there has been no tampering of a user's certificate.

Jones expresses some anger that the European researchers publicized their findings without first informing Network Associates of the flaw. "That was irresponsible of them," he says.

Network Associates says the discovered vulnerability is actually quite difficult to exploit. You have to modify the sender's public-key certificate, make sure the sender would have a copy of that and modify the recipient's key as well, Jones says. That is more easily said than done.

But it is certainly possible. And the PGP bug arises from the mistake that PGP originally made in not ensuring that all the additional decryption keys in the data-recovery field have to be signed to prevent the tampering.

"The reason the researchers could discover it at all is because we publish the source code for peer review," Jones adds.

However, until earlier this year, the government's encryption regulations did not permit encryption source code to be published online. So, the PGP source code was only available in a 43-volume, 65,000-page set of books sold in a Palo Alto bookstore called Printer's Ink.




RELATED STORIES:
Sigaba tries to simplify encrypted e-mail
August 25, 2000
Thwart hackers with a XyLoc wristwatch
August 23, 2000
Make your e-mail disappear
August 22, 2000
Review: U-Match mouse make biometrics easy
August 22, 2000
Security experts warn of holes in Lotus Domino
August 2, 2000

RELATED IDG.net STORIES:
Pretty Good Privacy not good enough
(The Industry Standard)
McAfee offers virus scan for Lotus Notes, Domino
(IDG.net)
Trend Micro, Network Associates settle dispute
(IDG.net)
Security hole found in Network Associates firewall
(Computerworld)
Security, the way it should be
(Computerworld)
Distributed firewalls still in their infancy
(Network World Fusion)
Being safe: Taking the quantum leap
(Computerworld)
Should you encode your e-mail?
(The Industry Standard)

RELATED SITES:
paper published by Ralf Senderek and Stephen Early
Network Associates

Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

 Search   

Back to the top   © 2001 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.