ID |
CVE-2000-0445
|
Summary |
The pgpk command in PGP 5.x on Unix systems uses an insufficiently random data source for non-interactive key pair generation, which may produce predictable keys. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:pgp:pgp:5.0_linux:*:*:*:*:*:*:*
cpe:2.3:a:pgp:pgp:5.0_linux:*:*:*:*:*:*:*
-
cpe:2.3:a:pgp:pgp:5.0i:*:*:*:*:*:*:*
cpe:2.3:a:pgp:pgp:5.0i:*:*:*:*:*:*:*
-
cpe:2.3:a:pgp:pgp:6.5_linux:*:*:*:*:*:*:*
cpe:2.3:a:pgp:pgp:6.5_linux:*:*:*:*:*:*:*
|
CVSS |
Base: | 2.1 (as of 10-09-2008 - 19:04) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
NONE |
NONE |
|
cvss-vector
via4
|
AV:L/AC:L/Au:N/C:P/I:N/A:N
|
refmap
via4
|
bid | 1251 | bugtraq | 20000523 Key Generation Security Flaw in PGP 5.0 | cert | CA-2000-09 | osvdb | 1355 | xf | pgp-key-predictable |
|
Last major update |
10-09-2008 - 19:04 |
Published |
24-05-2000 - 04:00 |
Last modified |
10-09-2008 - 19:04 |