SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Network Associates (NET)
NET 248.11-2.0%Nov 3 9:30 AM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: AlienTech who wrote (5922)8/26/2000 10:42:48 PM
From: ms.smartest.person   of 6021
 
PGP Working On Patch For Encryption Software Flaw

(URL: crn.com

By Marcia Savage
CRN
Santa Clara, Calif.
2:58 PM EST Fri., Aug. 25, 2000

PGP Security, a division of Network Associates, said Friday it is working on fixes for a flaw in its e-mail encryption software that makes it vulnerable to malicious attackers.

The bug was discovered in PGP (pretty good privacy) versions 5.5 through 6.5.3 by researcher Ralf Senderek, according to the CERT center at Carnegie Mellon University.

PGP, based here, says it learned of the bug Thursday morning and had staff working on a patch late into the night. Fixes for the flaw were scheduled to be posted Friday afternoon on PGP's Web site.

The security flaw pertains to a feature in certain versions of the PGP software that allows authorized extra decryption keys to be added to a user's public key certificate, CERT says. The bug allows an attacker to alter the user's public certificate and read messages.

"We're not aware of any customer who has had any data compromised or loss of security because of this bug," says Mike Wallach, president of PGP Security. "We think this is a very low probability and an unlikely scenario, but the possibility exists for someone to target an individual and, if given the right circumstances, to read their encrypted e-mail."

Wallach says the company published the software's source code for peer review with the intention of uncovering flaws and responding to them.

"We expect to have people scrutinize the code and look for vulnerabilities and let us know when they're found," Wallach says. "That's a way for us to know we have the most secure and highest quality encryption."

Wallach says PGP was not notified ahead of time by the researcher who found and published the security flaw. "We don't think that's a proper way for this process to have proceeded," he says.

--------------------------------------------------------------------------------
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext