First published: Tue Mar 06 2007(Updated: )
GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GnuPGME (Gnu Privacy Guard Message Envelopes) | <=1.1.3 | |
Debian GnuPG | <=1.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1263 is considered a moderate severity vulnerability due to the potential for message forgery.
To mitigate CVE-2007-1263, upgrade GnuPG to version 1.4.7 or later and GPGME to version 1.1.4 or later.
CVE-2007-1263 affects GnuPG versions 1.4.6 and earlier and GPGME versions prior to 1.1.4.
CVE-2007-1263 allows attackers to forge the contents of OpenPGP messages without detection.
You can confirm vulnerability to CVE-2007-1263 by checking if your GnuPG or GPGME versions are below the fixed versions.