header-logo
Suggest Exploit
vendor:
PGP Desktop
by:
Unknown
7.5
CVSS
HIGH
Arbitrary File Creation
CWE
Product Name: PGP Desktop
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: CVE-Unknown
CPE: a:pgp_corp:pgp_desktop
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Arbitrary File Creation in PGP ASCII Armor Decoder

The flaw in the implementation of the PGP ASCII Armor decoder allows an attacker to create an arbitrary file on a user's system. This can be exploited by decoding a specially crafted .sig file that contains malicious instructions to create the desired file. The attacker can choose the location and content of the file.

Mitigation:

To mitigate this vulnerability, it is recommended to update the PGP software to the latest version. Additionally, users should exercise caution when opening and verifying files using PGP, especially if they originate from untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/2556/info

ASCII Armor is a text based encoding format used by PGP (Pretty Good Privacy). While it is possible to encode any file using ASCII Armor, it is used by PGP to encode signature files and public keys to facilitate transmission in e-mail messages.

When a user opens a document for verification in PGP, its corresponding .sig file must be decoded from ASCII Armor.

Due to a flaw in the implementation of the decoder, an arbitrary file can be created on a users system. The file created would be of the attackers choice. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20738.doc.sig
cqrsecured