Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-1263

Опубликовано: 05 мар. 2007
Источник: redhat
EPSS Средний

Описание

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=430489gnupg/gpgme signed message spoofing

EPSS

Процентиль: 96%
0.25459
Средний

Связанные уязвимости

ubuntu
около 19 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

nvd
около 19 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

debian
около 19 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the comm ...

github
почти 4 года назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

oracle-oval
почти 19 лет назад

ELSA-2007-0107: Important: gnupg security update (IMPORTANT)

EPSS

Процентиль: 96%
0.25459
Средний