Vulnerability Description
A "mathematical flaw" in the implementation of the El Gamal signature algorithm for LibTomCrypt 1.0 to 1.0.2 allows attackers to generate valid signatures without having the private key.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libtomcrypt | Libtomcrypt | 1.0 |
References
- http://secunia.com/advisories/15233
- http://www.osvdb.org/16188
- http://www.securiteam.com/unixfocus/5JP092AFPG.html
- http://www.securityfocus.com/bid/13473
- http://www.securityfocus.org/archive/1/397649
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20455
- http://secunia.com/advisories/15233
- http://www.osvdb.org/16188
- http://www.securiteam.com/unixfocus/5JP092AFPG.html
- http://www.securityfocus.com/bid/13473
- http://www.securityfocus.org/archive/1/397649
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20455
FAQ
What is CVE-2005-1600?
CVE-2005-1600 is a vulnerability with a CVSS score of 7.5 (HIGH). A "mathematical flaw" in the implementation of the El Gamal signature algorithm for LibTomCrypt 1.0 to 1.0.2 allows attackers to generate valid signatures without having the private key.
How severe is CVE-2005-1600?
CVE-2005-1600 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-1600?
Check the references section above for vendor advisories and patch information. Affected products include: Libtomcrypt Libtomcrypt.