First published: Tue Mar 06 2007(Updated: )
KMail 1.9.5 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents KMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KMail | =0.0.29.2 | |
KMail | =1.0.23 | |
KMail | =1.0.24 | |
KMail | =1.0.25 | |
KMail | =1.0.26 | |
KMail | =1.0.27 | |
KMail | =1.0.28 | |
KMail | =1.0.29 | |
KMail | =1.0.29.1 | |
KMail | =1.0.29.2 | |
KMail | =1.1 | |
KMail | =1.2 | |
KMail | =1.3.1 | |
KMail | =1.7.1 | |
KMail | =1.9.1 | |
KMail | =1.86.2.36 | |
KMail | =1.87 | |
KMail | =1.88 | |
KMail | =1.89 | |
KMail | =1.90 | |
KMail | =1.92 | |
KMail | =1.93 | |
KMail | =1.94 | |
KMail | =1.95 | |
KMail | =1.101 | |
KMail | =1.102 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1265 is classified as a medium severity vulnerability.
To fix CVE-2007-1265, upgrade KMail to a version that addresses this vulnerability, such as KMail 1.9.6 or later.
CVE-2007-1265 can be exploited by remote attackers to forge the contents of OpenPGP messages.
CVE-2007-1265 affects KMail versions 1.9.5 and earlier.
The impact of CVE-2007-1265 on KMail users is the inability to visually distinguish between signed and unsigned portions of messages, leading to potential misinformation.