First published: Thu Dec 20 2018(Updated: )
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnupg Gnupg | >=2.1.12<=2.2.11 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
ubuntu/gnupg2 | <2.2.4-1ubuntu1.2 | 2.2.4-1ubuntu1.2 |
ubuntu/gnupg2 | <2.2.8-3ubuntu1.1 | 2.2.8-3ubuntu1.1 |
ubuntu/gnupg2 | <2.2.12-1 | 2.2.12-1 |
debian/gnupg1 | 1.4.23-1.1 1.4.23-2 | |
debian/gnupg2 | 2.2.27-2+deb11u2 2.2.40-1.1 2.2.43-8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-1000858.
The severity of CVE-2018-1000858 is high.
GnuPG version 2.1.12 - 2.2.11 is affected by CVE-2018-1000858.
CVE-2018-1000858 can be exploited by performing a CSRF attack through a WKD request.
Yes, there are remedies available for CVE-2018-1000858. Upgrading to GnuPG version 2.2.12-1 or later can fix the vulnerability.