CVE-2006-0049

NameCVE-2006-0049
Descriptiongpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-993-2
NVD severitymedium (attack range: remote)
Debian Bugs356125

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnupg (PTS)wheezy1.4.12-7+deb7u7fixed
wheezy (security)1.4.12-7+deb7u9fixed
jessie (security), jessie1.4.18-7+deb8u4fixed
gnupg2 (PTS)wheezy, wheezy (security)2.0.19-2+deb7u2fixed
jessie2.0.26-6+deb8u1fixed
stretch2.1.18-8~deb9u1fixed
buster, sid2.2.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnupgsource(unstable)1.4.2.2-1medium356125
gnupgsourcesarge1.4.1-1.sarge3mediumDSA-993-2
gnupgsourcewoody1.0.6-4woody5mediumDSA-993-2
gnupg2source(unstable)(not affected)

Notes

- gnupg2 <not-affected> (Vulnerable code not activated)

Search for package or bug name: Reporting problems