Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58106
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2007:059 (gnupg)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to gnupg
announced via advisory MDKSA-2007:059.

GnuPG prior to 1.4.7 and GPGME prior to 1.1.4, when run from the
command
line, did not visually distinguish signed and unsigned portions of
OpenPGP messages with multiple components. This could allow a remote
attacker to forge the contents of an email message without detection.

GnuPG 1.4.7 is being provided with this update and GPGME has been
patched on Mandriva 2007.0 to provide better visual notification on
these types of forgeries.

Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0


Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2007:059

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-1263
BugTraq ID: 22757
http://www.securityfocus.com/bid/22757
Bugtraq: 20070305 CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability (Google Search)
http://www.securityfocus.com/archive/1/461958/100/0/threaded
http://www.securityfocus.com/archive/1/461958/30/7710/threaded
Debian Security Information: DSA-1266 (Google Search)
http://www.debian.org/security/2007/dsa-1266
http://fedoranews.org/cms/node/2776
http://fedoranews.org/cms/node/2775
http://www.mandriva.com/security/advisories?name=MDKSA-2007:059
http://www.coresecurity.com/?action=item&id=1687
http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10496
http://www.redhat.com/support/errata/RHSA-2007-0106.html
http://www.redhat.com/support/errata/RHSA-2007-0107.html
http://www.securitytracker.com/id?1017727
http://secunia.com/advisories/24365
http://secunia.com/advisories/24407
http://secunia.com/advisories/24419
http://secunia.com/advisories/24420
http://secunia.com/advisories/24438
http://secunia.com/advisories/24489
http://secunia.com/advisories/24511
http://secunia.com/advisories/24544
http://secunia.com/advisories/24650
http://secunia.com/advisories/24734
http://secunia.com/advisories/24875
SGI Security Advisory: 20070301-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc
http://securityreason.com/securityalert/2353
SuSE Security Announcement: SUSE-SA:2007:024 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0008.html
http://www.trustix.org/errata/2007/0009/
http://www.ubuntu.com/usn/usn-432-1
http://www.ubuntu.com/usn/usn-432-2
http://www.vupen.com/english/advisories/2007/0835
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.