发布时间 :2000-12-19 00:00:00
修订时间 :2018-05-02 21:29:09

[原文]GnuPG (gpg) 1.0.3 does not properly check all signatures of a file containing multiple documents, which allows an attacker to modify contents of all documents but the first without detection.



- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:gnu:privacy_guard:1.0GNU GNU Privacy Guard 1.0
cpe:/a:gnu:privacy_guard:1.0.1GNU GNU Privacy Guard 1.0.1
cpe:/a:gnu:privacy_guard:1.0.2GNU GNU Privacy Guard 1.0.2
cpe:/a:gnu:privacy_guard:1.0.3GNU GNU Privacy Guard 1.0.3

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20001011 GPG 1.0.3 doesn't detect modifications to files with multiple signatures
(UNKNOWN)  BUGTRAQ  20001025 Immunix OS Security Update for gnupg package
(UNKNOWN)  DEBIAN  20001111 gnupg: incorrect signature verification
(UNKNOWN)  XF  gnupg-message-modify(5386)

- 漏洞信息

高危 未知
2000-12-19 00:00:00 2005-05-02 00:00:00

- 公告与补丁


- 漏洞信息

GnuPG Multiply Signed Message Document Modification
Local Access Required, Remote / Network Access Cryptographic
Loss of Integrity
Exploit Public

- 漏洞描述

GnuPG contains a flaw that may allow a malicious attacker to modify documents in a signed message without changing the apparent signatures. The issue is triggered when a message with multiple cleartext signatures and multiple attached documents is created. GnuPG does not compare each signature for each document in the message, but instead flags each document as good or bad depending on the first document in the file. It is possible that this flaw may allow an attacker to surreptitiously modify any document but the first, resulting in a loss of integrity.

- 时间线

2000-10-11 Unknow
2000-10-11 Unknow

- 解决方案

Upgrade to version 1.0.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者