CVE-2006-0455 : Detail

CVE-2006-0455

0.14%V3
Local
2006-02-15
21h00 +00:00
2018-10-19
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command "gpg --verify".

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.6 AV:L/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 27231

Publication date : 2006-02-14 23h00 +00:00
Author : taviso
EDB Verified : Yes

source: https://www.securityfocus.com/bid/16663/info GnuPG is affected by a detached signature verification-bypass vulnerability because it fails to properly notify scripts that an invalid detached signature was presented and that the verification process has failed. Exploiting this issue allows attackers to bypass the signature-verification process used in some automated scripts. Depending on the use of GnuPG, this may result in a false sense of security, the installation of malicious packages, the execution of attacker-supplied code, or other attacks. An example demonstrating this issue was provided: fortune >x.txt perl -e 'print "\xca"x"64"' >x.txt.sig gpgv x.txt.sig x.txt echo $? This creates a file as well as an obviously invalid detached signature file. The file is then successfully validated by 'gpgv', since the exit status is '0'.

Products Mentioned

Configuraton 0

Gnu>>Privacy_guard >> Version 1.0

Gnu>>Privacy_guard >> Version 1.0.1

Gnu>>Privacy_guard >> Version 1.0.2

Gnu>>Privacy_guard >> Version 1.0.3

Gnu>>Privacy_guard >> Version 1.0.3b

    Gnu>>Privacy_guard >> Version 1.0.4

    Gnu>>Privacy_guard >> Version 1.0.5

    Gnu>>Privacy_guard >> Version 1.0.6

    Gnu>>Privacy_guard >> Version 1.0.7

    Gnu>>Privacy_guard >> Version 1.2

    Gnu>>Privacy_guard >> Version 1.2.1

    Gnu>>Privacy_guard >> Version 1.2.2

    Gnu>>Privacy_guard >> Version 1.2.2

      Gnu>>Privacy_guard >> Version 1.2.3

      Gnu>>Privacy_guard >> Version 1.2.4

      Gnu>>Privacy_guard >> Version 1.2.5

      Gnu>>Privacy_guard >> Version 1.2.6

      Gnu>>Privacy_guard >> Version 1.2.7

      Gnu>>Privacy_guard >> Version 1.3.3

      Gnu>>Privacy_guard >> Version 1.3.4

      Gnu>>Privacy_guard >> Version 1.4

      Gnu>>Privacy_guard >> Version 1.4.1

      Gnu>>Privacy_guard >> Version 1.4.2

      References

      http://www.securityfocus.com/bid/16663
      Tags : vdb-entry, x_refsource_BID
      http://secunia.com/advisories/18956
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://www.trustix.org/errata/2006/0008
      Tags : vendor-advisory, x_refsource_TRUSTIX
      http://marc.info/?l=gnupg-devel&m=113999098729114&w=2
      Tags : mailing-list, x_refsource_MLIST
      http://www.openpkg.org/security/OpenPKG-SA-2006.001-gnupg.html
      Tags : vendor-advisory, x_refsource_OPENPKG
      http://secunia.com/advisories/19249
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://www.redhat.com/support/errata/RHSA-2006-0266.html
      Tags : vendor-advisory, x_refsource_REDHAT
      http://secunia.com/advisories/18934
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://fedoranews.org/updates/FEDORA-2006-116.shtml
      Tags : vendor-advisory, x_refsource_FEDORA
      http://www.securityfocus.com/archive/1/433931/100/0/threaded
      Tags : vendor-advisory, x_refsource_FEDORA
      http://secunia.com/advisories/18955
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://secunia.com/advisories/19130
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://www.gentoo.org/security/en/glsa/glsa-200602-10.xml
      Tags : vendor-advisory, x_refsource_GENTOO
      http://secunia.com/advisories/19532
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://secunia.com/advisories/18933
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://www.us.debian.org/security/2006/dsa-978
      Tags : vendor-advisory, x_refsource_DEBIAN
      http://www.osvdb.org/23221
      Tags : vdb-entry, x_refsource_OSVDB
      http://www.ubuntu.com/usn/usn-252-1
      Tags : vendor-advisory, x_refsource_UBUNTU
      http://secunia.com/advisories/18968
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://secunia.com/advisories/18845
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://secunia.com/advisories/18942
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://www.mandriva.com/security/advisories?name=MDKSA-2006:043
      Tags : vendor-advisory, x_refsource_MANDRIVA
      http://www.vupen.com/english/advisories/2006/0610
      Tags : vdb-entry, x_refsource_VUPEN