First published: Mon Mar 13 2006(Updated: )
gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
GnuPG | =1.4.2 | |
GnuPG | =1.4 | |
GnuPG | =1.4.1 | |
GnuPG | =1.0.3 | |
GnuPG | =1.2.1 | |
GnuPG | =1.0.7 | |
GnuPG | =1.0.5 | |
GnuPG | =1.0.6 | |
GnuPG | =1.3.3 | |
GnuPG | =1.2.2-rc1 | |
GnuPG | =1.2.2 | |
GnuPG | =1.4.2.1 | |
GnuPG | =1.0 | |
GnuPG | =1.0.2 | |
GnuPG | =1.2.3 | |
GnuPG | =1.2.6 | |
GnuPG | =1.2.5 | |
GnuPG | =1.0.4 | |
GnuPG | =1.3.4 | |
GnuPG | =1.0.1 | |
GnuPG | =1.0.3b | |
GnuPG | =1.2 | |
GnuPG | =1.2.7 | |
GnuPG | =1.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0049 has a moderate severity rating due to its potential impact on the integrity of signatures in GnuPG.
To fix CVE-2006-0049, you should upgrade GnuPG to version 1.4.2.2 or later, which addresses this vulnerability.
GnuPG versions prior to 1.4.2.2, including 1.4.2, 1.4.1, and earlier, are affected by CVE-2006-0049.
CVE-2006-0049 allows attackers to inject unsigned data by exploiting improper verification of non-detached signatures.
Yes, CVE-2006-0049 is a recognized vulnerability in GnuPG that was published in 2006 affecting earlier versions.