Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-1269

Опубликовано: 06 мар. 2007
Источник: debian
EPSS Низкий

Описание

GNUMail 1.1.2 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents GNUMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnumailunfixedpackage

Примечания

  • this is a "feature request", since gnupg is fixed from CVE-2007-1263

EPSS

Процентиль: 78%
0.01177
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

GNUMail 1.1.2 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents GNUMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.

nvd
больше 18 лет назад

GNUMail 1.1.2 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents GNUMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.

github
больше 3 лет назад

GNUMail 1.1.2 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents GNUMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.

EPSS

Процентиль: 78%
0.01177
Низкий