Unrated severityNVD Advisory· Published May 2, 2005· Updated Apr 16, 2026
CVE-2005-0366
CVE-2005-0366
Description
The integrity check feature in OpenPGP, when handling a message that was encrypted using cipher feedback (CFB) mode, allows remote attackers to recover part of the plaintext via a chosen-ciphertext attack when the first 2 bytes of a message block are known, and an oracle or other mechanism is available to determine whether an integrity check failed.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- eprint.iacr.org/2005/033nvdThird Party Advisory
- eprint.iacr.org/2005/033.pdfnvdTechnical DescriptionThird Party Advisory
- securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- www.gentoo.org/security/en/glsa/glsa-200503-29.xmlnvdThird Party Advisory
- www.kb.cert.org/vuls/id/303094nvdThird Party AdvisoryUS Government Resource
- www.securityfocus.com/bid/12529nvdThird Party AdvisoryVDB Entry
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.novell.com/linux/security/advisories/2005_07_sr.htmlnvdBroken Link
- www.osvdb.org/13775nvdBroken Link
- www.pgp.com/library/ctocorner/openpgp.htmlnvdBroken Link
News mentions
0No linked articles in our index yet.