Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
29 Jun 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-06-29 17:15
Updated : 2024-02-04 20:20
NVD link : CVE-2019-13050
Mitre link : CVE-2019-13050
CVE.ORG link : CVE-2019-13050
JSON object : View
Products Affected
f5
- traffix_signaling_delivery_controller
opensuse
- leap
sks_keyserver_project
- sks_keyserver
gnupg
- gnupg
fedoraproject
- fedora
CWE
CWE-295
Improper Certificate Validation