Vulnerability Bulletins |
Error de validación en GnuPG |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Integridad |
Dificulty | Experto |
Required attacker level | Acceso remoto sin cuenta a un servicio exotico |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | GnuPG |
Description |
|
Se ha descubierto una vulnerabilidad en GnuPG. La vulnerabilidad reside en una verificación incorrecta de firmas y encriptaciones. Un atacante podría añadir contenido en un mensaje firmado para que el destinatario que lo recibiese no pudiese distinguir entre el contenido firmado y el no firmado. |
|
Solution |
|
Actualización de software Red Hat (RHSA-2007:0106-2) Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 2.1) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 2.1) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 2.1) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor https://rhn.redhat.com/ Mandriva (MDKSA-2007:059) Corporate Server 3.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/gnupg-1.4.7-0.2.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/gnupg-1.4.7-0.2.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/gnupg-1.4.7-0.2.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/gnupg-1.4.7-0.2.C30mdk.src.rpm Multi Network Firewall 2.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/i586/gnupg-1.4.7-0.3.M20mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/SRPMS/gnupg-1.4.7-0.3.M20mdk.src.rpm Mandriva Linux 2006 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/gnupg-1.4.7-0.2.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/gnupg-1.4.7-0.2.20060mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/gnupg-1.4.7-0.2.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/gnupg-1.4.7-0.2.20060mdk.src.rpm Mandriva Linux 2007 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/gnupg-1.4.7-0.2mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/libgpgme11-1.1.2-2.1mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/libgpgme11-devel-1.1.2-2.1mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/gnupg-1.4.7-0.2mdv2007.0.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/gpgme-1.1.2-2.1mdv2007.0.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/gnupg-1.4.7-0.2mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/lib64gpgme11-1.1.2-2.1mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/lib64gpgme11-devel-1.1.2-2.1mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/gnupg-1.4.7-0.2mdv2007.0.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/gpgme-1.1.2-2.1mdv2007.0.src.rpm Corporate Server 4.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/gnupg-1.4.7-0.2.20060mlcs4.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/gnupg-1.4.7-0.2.20060mlcs4.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/gnupg-1.4.7-0.2.20060mlcs4.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/gnupg-1.4.7-0.2.20060mlcs4.src.rpm Debian Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7.dsc http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7.diff.gz http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7_alpha.deb AMD64 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7_amd64.deb ARM http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7_arm.deb HP Precision http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7_hppa.deb Intel IA-32 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7_ia64.deb Motorola 680x0 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge7_sparc.deb Red Hat (RHSA-2007:0107-2) Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux Desktop (v. 5 client) https://rhn.redhat.com/ SGI Advanced Linux Environment 3 / RPM / Patch 10383 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS Advanced Linux Environment 3 / SRPM / Patch 10383 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux |
|
Standar resources |
|
Property | Value |
CVE | CVE-2007-1263 |
BID | 22757 |
Other resources |
|
Red Hat Security Advisory (RHSA-2007:0106-2) https://rhn.redhat.com/errata/RHSA-2007-0106.html Mandriva Security Advisory (MDKSA-2007:059) http://www.mandriva.com/security/advisories?name=MDKSA-2007:059 Debian Security Advisory (DSA 1266-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00021.html Red Hat Security Advisory (RHSA-2007:0107-2) https://rhn.redhat.com/errata/RHSA-2007-0107.html SGI Security Advisory (20070301-01-P) ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc SUSE Security Advisory (SUSE-SA:2007:024) http://www.novell.com/linux/security/advisories/2007_24_gpg.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2007-03-06 |
1.1 | Aviso emitido por Mandriva (MDKSA-2007:059) | 2007-03-12 |
1.2 | Aviso emitido por Debian (DSA 1266-1) | 2007-03-14 |
1.3 | Aviso emitido por Red Hat (RHSA-2007:0107-2) | 2007-03-20 |
1.4 | Aviso emitido por SGI (20070301-01-P) | 2007-03-26 |
1.5 | Aviso emitido por Suse (SUSE-SA:2007:024) | 2007-04-03 |