GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1266-1 | New gnupg packages fix signature forgery |
Ubuntu USN |
USN-432-1 | GnuPG vulnerability |
Ubuntu USN |
USN-432-2 | GnuPG2, GPGME vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T12:50:35.270Z
Reserved: 2007-03-04T00:00:00
Link: CVE-2007-1263
No data.
Status : Deferred
Published: 2007-03-06T20:19:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-1263
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN