Vulnerability Details : CVE-2006-0049
gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
Exploit prediction scoring system (EPSS) score for CVE-2006-0049
Probability of exploitation activity in the next 30 days: 0.60%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 76 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-0049
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2006-0049
-
http://www.securityfocus.com/bid/17058
Patch
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10063
-
http://securityreason.com/securityalert/450
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25184
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477
-
http://www.trustix.org/errata/2006/0014
-
http://www.debian.org/security/2006/dsa-993
Patch;Vendor Advisory
-
https://usn.ubuntu.com/264-1/
- ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
-
http://securitytracker.com/id?1015749
Patch
- http://www.redhat.com/support/errata/RHSA-2006-0266.html
-
http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00021.html
-
http://lists.suse.de/archive/suse-security-announce/2006-Mar/0003.html
- http://www.securityfocus.com/archive/1/433931/100/0/threaded
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:055
-
http://www.securityfocus.com/archive/1/427324/100/0/threaded
-
http://www.vupen.com/english/advisories/2006/0915
-
http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html
Patch;Vendor Advisory
-
http://www.gentoo.org/security/en/glsa/glsa-200603-08.xml
Patch;Vendor Advisory
-
http://securityreason.com/securityalert/568
Products affected by CVE-2006-0049
- cpe:2.3:a:gnu:privacy_guard:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.3b:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:privacy_guard:1.4.2:*:*:*:*:*:*:*