Vulnerability Bulletins |
Falso positivo en la verificación de firmas en GnuPG |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Integridad |
Dificulty | Experto |
Required attacker level | Acceso remoto sin cuenta a un servicio exotico |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | GnuPG 1.4.x < 1.4.2.1 |
Description |
|
Se ha descubierto una vulnerabilidad en GnuPG 1.4.x versión anterior a 1.4.2.1. La vulnerabilidad reside en el programa gpgv el cual cuando está en modo de verificación de firmas automático, verifica firmas de ficheros externos como válidas incluso cuando están vacíos. | |
Solution |
|
Actualización de software Debian Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody4.dsc http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody4.diff.gz http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody4_alpha.deb ARM http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody4_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody4_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody4_ia64.deb HP Precision http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody4_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody4_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody4_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody4_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody4_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody4_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.0.6-4woody4_sparc.deb Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1.dsc http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1.diff.gz http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1_alpha.deb AMD64 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1_amd64.deb ARM http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1_ia64.deb HP Precision http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1sarge1_sparc.deb Mandriva Mandrakelinux 10.1 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/gnupg-1.2.4-1.2.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/gnupg-1.2.4-1.2.101mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/gnupg-1.2.4-1.2.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/gnupg-1.2.4-1.2.101mdk.src.rpm Corporate Server 2.1 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/gnupg-1.0.7-3.4.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/gnupg-1.0.7-3.4.C21mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/gnupg-1.0.7-3.4.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/gnupg-1.0.7-3.4.C21mdk.src.rpm Corporate Server 3.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/gnupg-1.2.4-1.2.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/gnupg-1.2.4-1.2.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/gnupg-1.2.4-1.2.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/gnupg-1.2.4-1.2.C30mdk.src.rpm Multi Network Firewall 2.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/RPMS/gnupg-1.2.4-1.2.M20mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/SRPMS/gnupg-1.2.4-1.2.M20mdk.src.rpm Mandrivalinux LE2005 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/gnupg-1.4.0-4.1.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/SRPMS/gnupg-1.4.0-4.1.102mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/gnupg-1.4.0-4.1.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/SRPMS/gnupg-1.4.0-4.1.102mdk.src.rpm Mandrivalinux 2006 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/gnupg-1.4.2-2.1.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/gnupg-1.4.2-2.1.20060mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/gnupg-1.4.2-2.1.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/SRPMS/gnupg-1.4.2-2.1.20060mdk.src.rpm Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux Red Hat Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 2.1) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 2.1) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 2.1) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) Red Hat Linux Advanced Workstation 2.1 Itanium https://rhn.redhat.com/ SGI Advanced Linux Environment 3 / RPM / Patch 10291 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS Advanced Linux Environment 3 / SRPM / Patch 10291 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS |
|
Standar resources |
|
Property | Value |
CVE | CVE-2006-0455 |
BID | |
Other resources |
|
[Announce] False positive signature verification in GnuPG http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000211.html Debian Security Advisory (DSA 978-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00055.html Mandriva Security Advisory (MDKSA-2006:043) http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:043 SUSE Security Advisory (SUSE-SA:2006:009) http://www.novell.com/linux/security/advisories/2006_09_gpg.html SUSE Security Advisory (SUSE-SA:2005:056) http://www.novell.com/linux/security/advisories/2006_05_sr.html Red Hat Security Advisory (RHSA-2006:0266-8) https://rhn.redhat.com/errata/RHSA-2006-0266.html SGI Security Advisory (20060401-01-U) ftp://patches.sgi.com/support/free/security/advisories/20060401-01.U.asc |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2006-02-17 |
1.1 | Aviso emitido por Mandriva (MDKSA-2006:043) | 2006-02-20 |
1.2 | Aviso emitido por Suse (SUSE-SA:2006:009) | 2006-02-23 |
1.3 | Aviso emitido por Suse (SUSE-SR:2006:005) | 2006-03-06 |
1.4 | Aviso emitido por Red Hat (RHSA-2006:0266-8) | 2006-03-16 |
1.5 | Aviso emitido por SGI (20060401-01-U) | 2006-04-05 |