what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

winpt-spoof.txt

winpt-spoof.txt
Posted Jun 13, 2007
Authored by nnposter

WinPT suffers from a user ID spoofing vulnerability.

tags | advisory, spoof
SHA-256 | b2b9f9374bc9992e7f0573e5b7ed735c0cadab81567f0041a1c809cd7d90ad5a

winpt-spoof.txt

Change Mirror Download
WinPT User ID Spoofing Vulnerability

Impact: Impersonation
Where: Remote
Status: Unpatched

Product: Windows Privacy Tray (WinPT)
http://wald.intevation.org/projects/winpt

Visual representation of keys in WinPT 1.2.0 is susceptible to a user ID spoofing attack using keys with large amount of data in the user IDs. In several instances the key user IDs are displayed in a fixed size window and any excessive user ID data are simply visually truncated. This allows an attacker to trick a target into using a key with additional user IDs that are hidden during certain operations, including key importing, key signing, key editing, and signature listing. This can in turn lead to unintentional encryption of sensitive information with the attacker's key instead of the legitimate key.


Attack Scenario:

The attacker creates a key with one or more user IDs that the target is willing to import and sign, e.g. "Attacker <attacker@foo.org>". If the objective is to obtain data normally encrypted for victim@bar.com then the attacker adds a user ID that looks like:

Attacker <attacker@foo.org>"SSSSMMMMSSSS<victim@bar.com>

where SSSS represents a large number of spaces (0x20) and MMMM is a bogus WinPT message. This will cause <victim@bar.com> to stay hidden and the message will further strengthen user's perception that he sees all key data.

Encrypting a sensitive plaintext for victim@bar.com with GnuPG will use the attacker's key as long as it has been loaded into the keyring before the legitimate key:

C:\>echo This is a secret | gpg -r victim@bar.com -e | gpg
gpg: encrypted with 1024-bit ELG-E key, ID 7F378BF7, created 2007-03-09
"Attacker <attacker@foo.com>"

A more detailed description including a sample key and screen shots is available in the WinPT bug repository (bug 327).

The vulnerability has been identified in version 1.2.0. However, other versions may be also affected.


Workaround:

Do not rely on WinPT to inspect and/or import keys; use GnuPG instead.


History:
3/9/07: Issue filed as bug 327
3/9/07: Issue acknowledged by the project maintainer
4/4/07: Maintainer announces an indefinite suspension of the project.
5/18/07: Request for a bug status
6/5/07: Request for a bug status
6/11/07: Public disclosure


Found by:
nnposter
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close