Upstream information

CVE-2006-0049 at MITRE

Description

gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 155400 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE LINUX 10.0
  • gpg >= 1.4.2-5.4
SUSE LINUX 9.1 for IA32
SUSE LINUX 9.1 for x86-64
  • gpg >= 1.2.4-68.13
SUSE LINUX 9.2
  • gpg >= 1.2.5-3.6
SUSE LINUX 9.3
  • gpg >= 1.4.0-4.4
SuSE Linux Desktop 1.0
  • gpg >= 1.2.2rc1-118
ul1.x86-64
ul1.s390
sles9-nlpos.x86
ul1.ia64
ul1.ppc
YOU Patch Nr: 10908
SUSE LINUX Retail Solution 8
SuSE Linux Enterprise Server 8 for AMD64
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Openexchange Server 4
SuSE Linux School Server for i386
SuSE Linux Standard Server 8
UnitedLinux 1.0
  • gpg >= 1.0.7-183
ul1.x86-64
ul1.s390
sles9-nlpos.x86
ul1.ia64
ul1.ppc
YOU Patch Nr: 10908
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
Open Enterprise Server
  • gpg >= 1.2.4-68.13
ul1.x86-64
ul1.s390
sles9-nlpos.x86
ul1.ia64
ul1.ppc
YOU Patch Nr: 10908