Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4351

Опубликовано: 10 окт. 2013
Источник: debian
EPSS Низкий

Описание

GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnupgfixed1.4.15-1package
gnupg2fixed2.0.22-1package

EPSS

Процентиль: 81%
0.0155
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.

redhat
больше 12 лет назад

GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.

nvd
почти 12 лет назад

GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.

github
больше 3 лет назад

GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.

oracle-oval
почти 12 лет назад

ELSA-2013-1459: gnupg2 security update (MODERATE)

EPSS

Процентиль: 81%
0.0155
Низкий