GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1266-1 | New gnupg packages fix signature forgery |
![]() |
USN-432-1 | GnuPG vulnerability |
![]() |
USN-432-2 | GnuPG2, GPGME vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T12:50:35.270Z
Reserved: 2007-03-04T00:00:00
Link: CVE-2007-1263

No data.

Status : Deferred
Published: 2007-03-06T20:19:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-1263


No data.