This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing a security update.
The OpenPGP protocol is vulnerable to a timing-attack in order to gain
plain text from cipher text. The timing difference appears as a side
effect of the so-called 'quick scan' and is only exploitable on
systems that accept an arbitrary amount of cipher text for automatic
The updated packages have been patched to disable the quick check for
all public key-encrypted messages and files.
See also :
Update the affected gnupg package.
Risk factor :
Medium / CVSS Base Score : 5.0