Page MenuHome GnuPG

Data corruption while decrypting CryptoEx generated message
Closed, ResolvedPublic

Description

Environment

GnuPG 1.2.1

Description

When decrypting one compressed and encrypted message, genera
ted by CryptoEx, GnuPG replaces ~3 bytes near the end of the message by 0x00. PGP decrypts this w/o problems.

The attached testdata exhibits other mismatches.

The problems seems to be with the inflate code.

How To Repeat

untar the archive, import the testkey, decrypt "cryptoex-encrypted.gpg", convert CRLF to LF and compare against plaintext. Passphrase is "password".

Fix

Changed window size of the uncompressor to the maximum of 15 bits. Note, that CryptoEx uses more than 13 bits and thus PGP 2 won't be able to uncompress such a message.

Manual fixing is trivial in g10/compress.c:init_uncompress - change -13 to -15.

Release Note

Fixed in CVS (stable and devel). To be released as 1.2.2