First published: Tue Mar 06 2007(Updated: )
KMail 1.9.5 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents KMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KDE K-Mail | =1.0.26 | |
KDE K-Mail | =1.88 | |
KDE K-Mail | =1.86.2.36 | |
KDE K-Mail | =1.1 | |
KDE K-Mail | =1.95 | |
KDE K-Mail | =1.92 | |
KDE K-Mail | =1.0.23 | |
KDE K-Mail | =1.3.1 | |
KDE K-Mail | =0.0.29.2 | |
KDE K-Mail | =1.93 | |
KDE K-Mail | =1.0.24 | |
KDE K-Mail | =1.0.25 | |
KDE K-Mail | =1.0.27 | |
KDE K-Mail | =1.102 | |
KDE K-Mail | =1.87 | |
KDE K-Mail | =1.90 | |
KDE K-Mail | =1.0.29.1 | |
KDE K-Mail | =1.0.29 | |
KDE K-Mail | =1.9.1 | |
KDE K-Mail | =1.0.29.2 | |
KDE K-Mail | =1.2 | |
KDE K-Mail | =1.101 | |
KDE K-Mail | =1.7.1 | |
KDE K-Mail | =1.94 | |
KDE K-Mail | =1.89 | |
KDE K-Mail | =1.0.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.