First published: Thu Feb 23 2006(Updated: )
The signature verification functionality in the YaST Online Update (YOU) script handling relies on a gpg feature that is not intended for signature verification, which prevents YOU from detecting malicious scripts or code that do not pass the signature check when gpg 1.4.x is being used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =9.3 | |
SUSE Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0803 is considered a medium severity vulnerability due to its impact on signature verification in the YaST Online Update.
To fix CVE-2006-0803, update YaST Online Update to a version that does not rely on the flawed gpg feature for signature verification.
CVE-2006-0803 affects SUSE Linux versions 9.3 and 10.0.
The impact of CVE-2006-0803 is that malicious scripts may not be detected during installation due to compromised signature verification.
A temporary workaround for CVE-2006-0803 includes performing manual verification of scripts before running updates.