Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-1263

Опубликовано: 05 мар. 2007
Источник: redhat
EPSS Средний

Описание

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=430489gnupg/gpgme signed message spoofing

EPSS

Процентиль: 95%
0.17694
Средний

Связанные уязвимости

ubuntu
больше 18 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

nvd
больше 18 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

debian
больше 18 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the comm ...

github
около 3 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

oracle-oval
почти 18 лет назад

ELSA-2007-0107: Important: gnupg security update (IMPORTANT)

EPSS

Процентиль: 95%
0.17694
Средний