Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-12020

Опубликовано: 08 июн. 2018
Источник: redhat
CVSS3: 7.5

Описание

mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.

A data validation flaw was found in the way gnupg processes file names during decryption and signature validation. An attacker may be able to inject messages into gnupg verbose message logging which may have the potential to bypass the integrity of signature authentication mechanisms and could have other unintended consequences if applications take action(s) based on parsed verbose gnupg output.

Отчет

Red Hat Product Security has rated this issue as having a security impact of Important, and a future update may address this flaw.

Меры по смягчению последствий

This flaw can be mitigated by appending the --no-verbose command line flag.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5gnupgWill not fix
Red Hat Enterprise Linux 5gnupg2Will not fix
Red Hat Enterprise Linux 8gnupg2Not affected
Red Hat Enterprise Linux 6gnupg2FixedRHSA-2018:218011.07.2018
Red Hat Enterprise Linux 7gnupg2FixedRHSA-2018:218111.07.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1589620gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.

CVSS3: 7.5
nvd
больше 7 лет назад

mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.

CVSS3: 7.5
debian
больше 7 лет назад

mainproc.c in GnuPG before 2.2.8 mishandles the original filename duri ...

suse-cvrf
больше 7 лет назад

Security update for gpg2

suse-cvrf
больше 7 лет назад

Security update for python-python-gnupg

7.5 High

CVSS3