First published: Tue Mar 06 2007(Updated: )
Evolution 2.8.1 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Evolution from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Evolution | <=2.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1266 is classified as a moderate severity vulnerability due to its potential for message forgery.
To fix CVE-2007-1266, upgrade to Evolution version 2.8.2 or later, which addresses the issue.
The risks associated with CVE-2007-1266 include the potential for attackers to forge OpenPGP message content.
CVE-2007-1266 affects Evolution versions 2.8.1 and earlier.
CVE-2007-1266 impacts OpenPGP message security by preventing proper visual distinction between signed and unsigned message portions.