Количество 18
Количество 18

RLSA-2020:4490
Moderate: gnupg2 security, bug fix, and enhancement update

CVE-2018-1000858
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.

CVE-2018-1000858
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.

CVE-2018-1000858
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
CVE-2018-1000858
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CS ...

CVE-2019-13050
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

CVE-2019-13050
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

CVE-2019-13050
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.

openSUSE-SU-2019:0020-1
Security update for gpg2

SUSE-SU-2019:0023-1
Security update for gpg2
GHSA-44cw-f8qw-mf2h
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.

BDU:2020-01716
Уязвимость перекрестного запроса «CSRF» программы для шифрования информации и создания электронных цифровых подписей GNU Privacy Guard (GnuPG), позволяющая нарушителю совершить атаку типа отказ в обслуживании

openSUSE-SU-2019:1917-1
Security update for gpg2

SUSE-SU-2019:2480-1
Security update for gpg2

SUSE-SU-2019:2006-1
Security update for gpg2
GHSA-ch5h-mpfr-fhxh
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
ELSA-2020-4490
ELSA-2020-4490: gnupg2 security, bug fix, and enhancement update (MODERATE)

BDU:2019-02942
Уязвимость сетевого программного средства SKS Keyserver и программы для шифрования информации и создания электронных цифровых подписей GNU Privacy Guard (GnuPG), связанная с отсутствием проверки хостовых данных сертификата, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | RLSA-2020:4490 Moderate: gnupg2 security, bug fix, and enhancement update | больше 4 лет назад | ||
![]() | CVE-2018-1000858 GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060. | CVSS3: 8.8 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-1000858 GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060. | CVSS3: 5.4 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-1000858 GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060. | CVSS3: 8.8 | 0% Низкий | больше 6 лет назад |
CVE-2018-1000858 GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CS ... | CVSS3: 8.8 | 0% Низкий | больше 6 лет назад | |
![]() | CVE-2019-13050 Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack. | CVSS3: 7.5 | 1% Низкий | почти 6 лет назад |
![]() | CVE-2019-13050 Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack. | CVSS3: 6.5 | 1% Низкий | почти 6 лет назад |
![]() | CVE-2019-13050 Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack. | CVSS3: 7.5 | 1% Низкий | почти 6 лет назад |
![]() | openSUSE-SU-2019:0020-1 Security update for gpg2 | 0% Низкий | около 6 лет назад | |
![]() | SUSE-SU-2019:0023-1 Security update for gpg2 | 0% Низкий | больше 6 лет назад | |
GHSA-44cw-f8qw-mf2h GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060. | CVSS3: 8.8 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2020-01716 Уязвимость перекрестного запроса «CSRF» программы для шифрования информации и создания электронных цифровых подписей GNU Privacy Guard (GnuPG), позволяющая нарушителю совершить атаку типа отказ в обслуживании | CVSS3: 6.3 | 0% Низкий | больше 6 лет назад |
![]() | openSUSE-SU-2019:1917-1 Security update for gpg2 | 1% Низкий | почти 6 лет назад | |
![]() | SUSE-SU-2019:2480-1 Security update for gpg2 | 1% Низкий | больше 5 лет назад | |
![]() | SUSE-SU-2019:2006-1 Security update for gpg2 | 1% Низкий | почти 6 лет назад | |
GHSA-ch5h-mpfr-fhxh Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack. | CVSS3: 7.5 | 1% Низкий | около 3 лет назад | |
ELSA-2020-4490 ELSA-2020-4490: gnupg2 security, bug fix, and enhancement update (MODERATE) | больше 4 лет назад | |||
![]() | BDU:2019-02942 Уязвимость сетевого программного средства SKS Keyserver и программы для шифрования информации и создания электронных цифровых подписей GNU Privacy Guard (GnuPG), связанная с отсутствием проверки хостовых данных сертификата, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | почти 6 лет назад |
Уязвимостей на страницу