First published: Mon Feb 12 2001(Updated: )
gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GnuPGME (Gnu Privacy Guard Message Envelopes) | =1.0 | |
GnuPGME (Gnu Privacy Guard Message Envelopes) | =1.0.1 | |
GnuPGME (Gnu Privacy Guard Message Envelopes) | =1.0.2 | |
GnuPGME (Gnu Privacy Guard Message Envelopes) | =1.0.3 | |
GnuPGME (Gnu Privacy Guard Message Envelopes) | =1.0.3b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0071 is classified as a moderate severity vulnerability.
To fix CVE-2001-0071, upgrade GnuPG to version 1.0.4 or later, where the issue is addressed.
CVE-2001-0071 can allow attackers to modify the contents of a file undetected.
CVE-2001-0071 affects GnuPG versions 1.0 through 1.0.3b.
CVE-2001-0071 is mostly considered outdated but could still pose a risk if legacy systems are in use.