ID CVE-2007-1267
Summary Sylpheed 2.2.7 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Sylpheed from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.
References
Vulnerable Configurations
  • cpe:2.3:a:sylpheed:sylpheed:*:*:*:*:*:*:*:*
    cpe:2.3:a:sylpheed:sylpheed:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 16-10-2018 - 16:37)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
bid 22777
bugtraq 20070305 CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability
misc http://www.coresecurity.com/?action=item&id=1687
mlist [gnupg-users] 20070306 [Announce] Multiple Messages Problem in GnuPG and GPGME
sectrack 1017727
secunia 24414
sreason 2353
vupen ADV-2007-0835
Last major update 16-10-2018 - 16:37
Published 06-03-2007 - 20:19
Last modified 16-10-2018 - 16:37
Back to Top