Upstream information

CVE-2007-1263 at MITRE

Description

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 251605 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE LINUX 10.0
  • gpg >= 1.4.2-5.14
SUSE LINUX 10.1
  • gpg >= 1.4.2-23.16
SUSE LINUX 9.3
  • gpg >= 1.4.0-4.14
SuSE Linux Desktop 1.0
  • gpg >= 1.2.2rc1-128
slrs8.x86
sles10.s390x
ul1.s390
sled10.x86
core9.s390
sles9-oes.x86
ZYPP Patch Nr: 2994
SUSE LINUX Retail Solution 8
SuSE Linux Enterprise Server 8 for AMD64
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Openexchange Server 4
SuSE Linux School Server for i386
SuSE Linux Standard Server 8
UnitedLinux 1.0
  • gpg >= 1.0.7-195
slrs8.x86
sles10.s390x
ul1.s390
sled10.x86
core9.s390
sles9-oes.x86
ZYPP Patch Nr: 2994
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
Open Enterprise Server
  • gpg >= 1.2.4-68.25
slrs8.x86
sles10.s390x
ul1.s390
sled10.x86
core9.s390
sles9-oes.x86
ZYPP Patch Nr: 2994