Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-0455

Опубликовано: 15 фев. 2006
Источник: debian
EPSS Низкий

Описание

gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command "gpg --verify".

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnupgfixed1.4.2.2-1package
gnupg2not-affectedpackage

EPSS

Процентиль: 84%
0.02209
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command "gpg --verify".

redhat
больше 19 лет назад

gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command "gpg --verify".

nvd
больше 19 лет назад

gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command "gpg --verify".

github
больше 3 лет назад

gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command "gpg --verify".

fstec
больше 10 лет назад

Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить целостность защищаемой информации

EPSS

Процентиль: 84%
0.02209
Низкий