Bug Affects KGPG's Versions From 0.6 to 0.8.2

Adam Pavelec apavelec@benefit-services.com
Mon Nov 11 21:13:01 2002


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- From http://devel-home.kde.org/~kgpg/bug.html

- -----BEGIN QUOTE-----

Grave security bug reported (06.11.02) :

Affects:
Bug affects Kgpg's versions from 0.6 to 0.8.2. 

Description:
A bug in Kgpg's key generation affects all secret keys generated
through Kgpg's wizard. (Bug does not affect keys created in
console/expert mode). All keys created through the wizard have
an empty passphrase, which means that if someone has access to
your computer and can read your secret key, he/she can decrypt
your files whitout the need of a passphrase. 

Why this bug, is Kgpg insecure ? This bug happened because the
way the passphrase was sent to GnuPG was incorrect. Thus,
passphrase was considered empty. Basically, Kgpg is just a
frontend that sends command line arguments to GnuPG. So, there
shouldn't be security issues, except when the sent commands are
wrong... I always tried to be very careful... If some users
think it is usefull, I could introduce a paranoia mode that
displays each command before executing it. 

What can you do:
We strongly recommend that you delete all secret created with
the wizard. You can also edit the key and give it a new
passphrase, however, the key may have been compromised in the
meantime.
All Kgpg's users are also strongly advised to update to version
0.9.

Sorry for all inconveniences... 

- -----END QUOTE-----



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.0

iD8DBQE90A9vDwRQnkBSh2sRAiRZAKDccjmOX6xRSA4K8KnrBFYaobas8gCfTbKN
S+09uJVmJCYqJw2NlYQCZlM=
=rd47
-----END PGP SIGNATURE-----