Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.56421
Categoría:Slackware Local Security Checks
Título:Slackware: Security Advisory (SSA:2006-072-02)
Resumen:The remote host is missing an update for the 'gnupg' package(s) announced via the SSA:2006-072-02 advisory.
Descripción:Summary:
The remote host is missing an update for the 'gnupg' package(s) announced via the SSA:2006-072-02 advisory.

Vulnerability Insight:
New GnuPG packages are available for Slackware 9.0, 9.1, 10.0, 10.1, 10.2,
and -current to fix security issues.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

[links moved to references]


Here are the details from the Slackware 10.2 ChangeLog:
+--------------------------+
patches/packages/gnupg-1.4.2.2-i486-1.tgz: Upgraded to gnupg-1.4.2.2.
There have been two security related issues reported recently with GnuPG.
From the GnuPG 1.4.2.1 and 1.4.2.2 NEWS files:
Noteworthy changes in version 1.4.2.2 (2006-03-08)
* Files containing several signed messages are not allowed any
longer as there is no clean way to report the status of such
files back to the caller. To partly revert to the old behaviour
the new option --allow-multisig-verification may be used.
Noteworthy changes in version 1.4.2.1 (2006-02-14)
* Security fix for a verification weakness in gpgv. Some input
could lead to gpgv exiting with 0 even if the detached signature
file did not carry any signature. This is not as fatal as it
might seem because the suggestion as always been not to rely on
th exit code but to parse the --status-fd messages. However it
is likely that gpgv is used in that simplified way and thus we
do this release. Same problem with 'gpg --verify' but nobody
should have used this for signature verification without
checking the status codes anyway. Thanks to the taviso from
Gentoo for reporting this problem.
(* Security fix *)
+--------------------------+

Affected Software/OS:
'gnupg' package(s) on Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-0049
BugTraq ID: 17058
http://www.securityfocus.com/bid/17058
Bugtraq: 20060309 GnuPG does not detect injection of unsigned data (Google Search)
http://www.securityfocus.com/archive/1/427324/100/0/threaded
Debian Security Information: DSA-993 (Google Search)
http://www.debian.org/security/2006/dsa-993
http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00021.html
http://www.securityfocus.com/archive/1/433931/100/0/threaded
http://www.gentoo.org/security/en/glsa/glsa-200603-08.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:055
http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html
http://www.osvdb.org/23790
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10063
http://www.redhat.com/support/errata/RHSA-2006-0266.html
http://securitytracker.com/id?1015749
http://secunia.com/advisories/19173
http://secunia.com/advisories/19197
http://secunia.com/advisories/19203
http://secunia.com/advisories/19231
http://secunia.com/advisories/19232
http://secunia.com/advisories/19234
http://secunia.com/advisories/19244
http://secunia.com/advisories/19249
http://secunia.com/advisories/19287
http://secunia.com/advisories/19532
SGI Security Advisory: 20060401-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477
http://securityreason.com/securityalert/450
http://securityreason.com/securityalert/568
SuSE Security Announcement: SUSE-SA:2006:014 (Google Search)
http://lists.suse.de/archive/suse-security-announce/2006-Mar/0003.html
http://www.trustix.org/errata/2006/0014
https://usn.ubuntu.com/264-1/
http://www.vupen.com/english/advisories/2006/0915
XForce ISS Database: gnupg-nondetached-sig-verification(25184)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25184
Common Vulnerability Exposure (CVE) ID: CVE-2006-0455
16663
http://www.securityfocus.com/bid/16663
18845
http://secunia.com/advisories/18845
18933
http://secunia.com/advisories/18933
18934
http://secunia.com/advisories/18934
18942
http://secunia.com/advisories/18942
18955
http://secunia.com/advisories/18955
18956
http://secunia.com/advisories/18956
18968
http://secunia.com/advisories/18968
19130
http://secunia.com/advisories/19130
19249
19532
2006-0008
http://www.trustix.org/errata/2006/0008
20060215 False positive signature verification in GnuPG
http://www.securityfocus.com/archive/1/425289/100/0/threaded
20060401-01-U
23221
http://www.osvdb.org/23221
ADV-2006-0610
http://www.vupen.com/english/advisories/2006/0610
DSA-978
http://www.us.debian.org/security/2006/dsa-978
FEDORA-2006-116
http://fedoranews.org/updates/FEDORA-2006-116.shtml
FLSA-2006:185355
GLSA-200602-10
http://www.gentoo.org/security/en/glsa/glsa-200602-10.xml
MDKSA-2006:043
http://www.mandriva.com/security/advisories?name=MDKSA-2006:043
OpenPKG-SA-2006.001
http://www.openpkg.org/security/OpenPKG-SA-2006.001-gnupg.html
RHSA-2006:0266
SSA:2006-072-02
SUSE-SA:2006:009
http://www.novell.com/linux/security/advisories/2006_09_gpg.html
SUSE-SA:2006:013
http://www.novell.com/linux/security/advisories/2006_13_gpg.html
SUSE-SR:2006:005
http://www.novell.com/linux/security/advisories/2006_05_sr.html
USN-252-1
http://www.ubuntu.com/usn/usn-252-1
[gnupg-announce] 20060215 False positive signature verification in GnuPG
http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000211.html
[gnupg-devel] 20060215 [Announce] False positive signature verification in GnuPG
http://marc.info/?l=gnupg-devel&m=113999098729114&w=2
gnupg-gpgv-improper-verification(24744)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24744
oval:org.mitre.oval:def:10084
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10084
CopyrightCopyright (C) 2012 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.