6.1 Medium
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.006 Low
EPSS
Percentile
78.0%
gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html
lists.suse.de/archive/suse-security-announce/2006-Mar/0003.html
secunia.com/advisories/19173
secunia.com/advisories/19197
secunia.com/advisories/19203
secunia.com/advisories/19231
secunia.com/advisories/19232
secunia.com/advisories/19234
secunia.com/advisories/19244
secunia.com/advisories/19249
secunia.com/advisories/19287
secunia.com/advisories/19532
securityreason.com/securityalert/450
securityreason.com/securityalert/568
securitytracker.com/id?1015749
www.debian.org/security/2006/dsa-993
www.gentoo.org/security/en/glsa/glsa-200603-08.xml
www.mandriva.com/security/advisories?name=MDKSA-2006:055
www.osvdb.org/23790
www.redhat.com/archives/fedora-announce-list/2006-March/msg00021.html
www.redhat.com/support/errata/RHSA-2006-0266.html
www.securityfocus.com/archive/1/427324/100/0/threaded
www.securityfocus.com/archive/1/433931/100/0/threaded
www.securityfocus.com/bid/17058
www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477
www.trustix.org/errata/2006/0014
www.vupen.com/english/advisories/2006/0915
exchange.xforce.ibmcloud.com/vulnerabilities/25184
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10063
usn.ubuntu.com/264-1/