gabriel rosenkoetter on Wed, 12 Mar 2003 20:34:10 -0500


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[PLUG] Potential PGP signature verification problem? (fwd) (fwd)


For those of you using the commercial PGP. Pretty boneheaded, since
creating a hash including the OLE file is trivial, it'd make sense
to just do it and forget about it. (SHA1 doesn't care what your
"format" your bits are...)

-- 
gabriel rosenkoetter
gr@eclipsed.net

----- Forwarded message from Thomas Shaddack <shaddack@ns.arachne.cz> -----

From: Thomas Shaddack <shaddack@ns.arachne.cz>
Subject: Potential PGP signature verification problem? (fwd)
Date: Wed, 12 Mar 2003 21:43:04 +0100 (CET)
To: cypherpunks <cypherpunks@lne.com>
Delivered-To: gr@eclipsed.net
X-Authentication-Warning: hq.pro-ns.net: majordom set sender to owner-cypherpunks@ds.pro-ns.net using -f
X-Authentication-Warning: slack.lne.com: majordom set sender to owner-cypherpunks@lne.com using -f
X-X-Sender: <shad@Zeta>
X-Loop: cypherpunks@lne.com
X-spam: 0 
Precedence: bulk
X-Loop: ds.pro-ns.net


This could be of interest for y'all. An important caveat for crypto use.

---------- Forwarded message ----------
Date: 12 Mar 2003 19:59:30 -0000
Subject: Potential PGP signature verification problem?
From: Avri Schneider <avri_schneider@yahoo.com>
To: bugtraq@securityfocus.com



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,

I have come across a possible problem in the way PGP handles
signature verification.
The problem lies in the fact that PGP will strip OLE objects inserted
in an e-mail and verify the message signature based only on the text,
not informing the user that objects were striped.
A WordPad document can be inserted in the e-mail as an OLE object,
having the same font style and size as the original message.
An attacker would take a signed message and insert such word document
anywhere in the message as an OLE object and when the recepient
checks the signature - the wordpad document is stripped and the
signature would be valid - The attack would only work if the
recepient does not use the pgp verified message "text viewer" dialog
box to read the message but uses it only to verify the validity of
the signature.

This was tested with pgp.com's PGP version 8.0, other versions may be
vulnerable as well.

I have experimented with older versions and they only worked in the
hash field of the PGP header which is stripped before the message is
verified and the same attack can be performed but text would only be
added at the beginning of the message.

Regards,
Avri Schneider
http://pgp.mit.edu 0x44F87D04

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0 - not licensed for commercial use: www.pgp.com

iQA/AwUBPm0AKGelhJFE+H0EEQIyxACg7HTH5UjaSGy5D3cobYx0h6io1lsAnRk1
cWnPtLBNw3G3XBkZuuUXPgIg
=fWay
-----END PGP SIGNATURE-----


----- End forwarded message -----

Attachment: pgpuDiEJh4nnR.pgp
Description: PGP signature