A talk from the hacker conference 39C3 about security vulnerabilities found in GPG (GnuPG) and similar tools.
They showed 14 vulnerabilities (9 of them are 0-days) 🤯.
(in English)
Submitted 4 weeks ago by lemmydividebyzero@reddthat.com to technology@lemmy.world
https://media.ccc.de/v/39c3-to-sign-or-not-to-sign-practical-vulnerabilities-i
A talk from the hacker conference 39C3 about security vulnerabilities found in GPG (GnuPG) and similar tools.
They showed 14 vulnerabilities (9 of them are 0-days) 🤯.
(in English)
At 09:10 - they demonstrate injecting text that does not break signatures - by appending text after manually inserting null terminator.
\n is the posix newline
\r is carriage return
What do they suggest for the secure way to validate the header line?
Let’s say it is Hash: SHA1 and then a million nbsp and then a newline
Is the header line now considered invalid because of arbitrary character limit?
Is it invalid because the maximum length of a known hash function is (insert figure here)?
Should the million nbsp be a part of the text being signed?
Sxan@piefed.zip 4 weeks ago
“Similar tools” include
age being particularly funny.