Vulnerabilidad en gpgv in GnuPG (CVE-2006-0455)
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
15/02/2006
Última modificación:
03/04/2025
Descripción
gpgv en GnuPG en versiones anteriores a 1.4.2.1, cuando se utiliza verificación de firma desatendida, devuelve un código de salida 0 en algunos casos, incluso cuando el archivo de firma acompañante no lleva una firma, esto puede provocar que los programas que usen gpgv asuman que la verificación de la firma ha tenido éxito. Nota: Esto también ocurre cuando se ejecuta el comando equivalente "gpg --verify".
Impacto
Puntuación base 2.0
4.60
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:gnu:privacy_guard:1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.0.3b:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.2.2:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:gnu:privacy_guard:1.2.4:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
- http://fedoranews.org/updates/FEDORA-2006-116.shtml
- http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000211.html
- http://marc.info/?l=gnupg-devel&m=113999098729114&w=2
- http://secunia.com/advisories/18845
- http://secunia.com/advisories/18933
- http://secunia.com/advisories/18934
- http://secunia.com/advisories/18942
- http://secunia.com/advisories/18955
- http://secunia.com/advisories/18956
- http://secunia.com/advisories/18968
- http://secunia.com/advisories/19130
- http://secunia.com/advisories/19249
- http://secunia.com/advisories/19532
- http://www.gentoo.org/security/en/glsa/glsa-200602-10.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A043
- http://www.novell.com/linux/security/advisories/2006_05_sr.html
- http://www.novell.com/linux/security/advisories/2006_09_gpg.html
- http://www.novell.com/linux/security/advisories/2006_13_gpg.html
- http://www.openpkg.org/security/OpenPKG-SA-2006.001-gnupg.html
- http://www.osvdb.org/23221
- http://www.redhat.com/support/errata/RHSA-2006-0266.html
- http://www.securityfocus.com/archive/1/425289/100/0/threaded
- http://www.securityfocus.com/archive/1/433931/100/0/threaded
- http://www.securityfocus.com/bid/16663
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477
- http://www.trustix.org/errata/2006/0008
- http://www.ubuntu.com/usn/usn-252-1
- http://www.us.debian.org/security/2006/dsa-978
- http://www.vupen.com/english/advisories/2006/0610
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24744
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10084
- ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
- http://fedoranews.org/updates/FEDORA-2006-116.shtml
- http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000211.html
- http://marc.info/?l=gnupg-devel&m=113999098729114&w=2
- http://secunia.com/advisories/18845
- http://secunia.com/advisories/18933
- http://secunia.com/advisories/18934
- http://secunia.com/advisories/18942
- http://secunia.com/advisories/18955
- http://secunia.com/advisories/18956
- http://secunia.com/advisories/18968
- http://secunia.com/advisories/19130
- http://secunia.com/advisories/19249
- http://secunia.com/advisories/19532
- http://www.gentoo.org/security/en/glsa/glsa-200602-10.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A043
- http://www.novell.com/linux/security/advisories/2006_05_sr.html
- http://www.novell.com/linux/security/advisories/2006_09_gpg.html
- http://www.novell.com/linux/security/advisories/2006_13_gpg.html
- http://www.openpkg.org/security/OpenPKG-SA-2006.001-gnupg.html
- http://www.osvdb.org/23221
- http://www.redhat.com/support/errata/RHSA-2006-0266.html
- http://www.securityfocus.com/archive/1/425289/100/0/threaded
- http://www.securityfocus.com/archive/1/433931/100/0/threaded
- http://www.securityfocus.com/bid/16663
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477
- http://www.trustix.org/errata/2006/0008
- http://www.ubuntu.com/usn/usn-252-1
- http://www.us.debian.org/security/2006/dsa-978
- http://www.vupen.com/english/advisories/2006/0610
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24744
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10084