Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-1263

Опубликовано: 06 мар. 2007
Источник: debian
EPSS Средний

Описание

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnupgfixed1.4.6-2package
gpgme1.0fixed1.1.2-3package
gnupg2fixed2.0.3-1package
gnupg2no-dsasargepackage
gnupg2no-dsaetchpackage

EPSS

Процентиль: 95%
0.17694
Средний

Связанные уязвимости

ubuntu
больше 18 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

redhat
больше 18 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

nvd
больше 18 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

github
больше 3 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

oracle-oval
около 18 лет назад

ELSA-2007-0107: Important: gnupg security update (IMPORTANT)

EPSS

Процентиль: 95%
0.17694
Средний