TROYANOSYVIRUS
Back to CVEs

CVE-2019-13050

HIGH
7.5

Description

Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

CVE Details

CVSS v3.1 Score7.5
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published6/29/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

f5:traffix_signaling_delivery_controllerfedoraproject:fedoragnupg:gnupgopensuse:leapsks_keyserver_project:sks_keyserver

Weaknesses (CWE)

CWE-295

References

https://support.f5.com/csp/article/K08654551(af854a3a-2127-422b-91ae-364da2661108)
https://twitter.com/lambdafu/status/1147162583969009664(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.