HIGH · 7.5

CVE-2019-6690

python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and t...

Vulnerability Description

python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
PythonPython-Gnupg0.4.3
DebianDebian Linux8.0
OpensuseLeap15.0
SuseBackports-
SuseLinux Enterprise15.0
CanonicalUbuntu Linux18.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-6690?

CVE-2019-6690 is a vulnerability with a CVSS score of 7.5 (HIGH). python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and t...

How severe is CVE-2019-6690?

CVE-2019-6690 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-6690?

Check the references section above for vendor advisories and patch information. Affected products include: Python Python-Gnupg, Debian Debian Linux, Opensuse Leap, Suse Backports, Suse Linux Enterprise.