First published: Tue Mar 06 2007(Updated: )
GNUMail 1.1.2 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents GNUMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnu Gnumail | <=1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2007-1269 is classified as moderate due to its potential for message content forgery.
To fix CVE-2007-1269, update GNUMail to version 1.1.3 or later.
GNUMail versions 1.1.2 and earlier are affected by CVE-2007-1269.
Yes, CVE-2007-1269 can lead to a security breach by allowing attackers to forge message contents.
CVE-2007-1269 primarily affects GNUMail's implementation of GnuPG and not GnuPG itself.