exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2007.059

Mandriva Linux Security Advisory 2007.059
Posted Mar 13, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - GnuPG prior to 1.4.7 and GPGME prior to 1.1.4, when run from the command line, did not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components. This could allow a remote attacker to forge the contents of an email message without detection.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2007-1263
SHA-256 | b5f3387c0e15f3e5caa78f0a24fad853f5e06d5408aa866da22a14bd113d045a

Mandriva Linux Security Advisory 2007.059

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:059
https://www.mandriva.com/security/
_______________________________________________________________________

Package : gnupg
Date : March 8, 2007
Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

GnuPG prior to 1.4.7 and GPGME prior to 1.1.4, when run from the
command
line, did not visually distinguish signed and unsigned portions of
OpenPGP messages with multiple components. This could allow a remote
attacker to forge the contents of an email message without detection.

GnuPG 1.4.7 is being provided with this update and GPGME has been
patched on Mandriva 2007.0 to provide better visual notification on
these types of forgeries.
_______________________________________________________________________

References:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1263
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2006.0:
ec697754fca080fa53c6c486cd91ba8c 2006.0/i586/gnupg-1.4.7-0.2.20060mdk.i586.rpm
f30ab12655598264c10cee92ed76c951 2006.0/SRPMS/gnupg-1.4.7-0.2.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
845bfd1f359b7866e73ab2eb8b30b8fe 2006.0/x86_64/gnupg-1.4.7-0.2.20060mdk.x86_64.rpm
f30ab12655598264c10cee92ed76c951 2006.0/SRPMS/gnupg-1.4.7-0.2.20060mdk.src.rpm

Mandriva Linux 2007.0:
c1b40e8866482c368aab5df228093ab3 2007.0/i586/gnupg-1.4.7-0.2mdv2007.0.i586.rpm
9dbf1a7a48aecb2ece048b47f4c7ade9 2007.0/i586/libgpgme11-1.1.2-2.1mdv2007.0.i586.rpm
3809f32ed3708606e6318fb7feed230d 2007.0/i586/libgpgme11-devel-1.1.2-2.1mdv2007.0.i586.rpm
62d991ccd15ca77ed37ccd4ca1bedba7 2007.0/SRPMS/gnupg-1.4.7-0.2mdv2007.0.src.rpm
31357e977acd83d777df2d77c22094f6 2007.0/SRPMS/gpgme-1.1.2-2.1mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
d5339dd2bc4146dd18c2ab3b4eca028d 2007.0/x86_64/gnupg-1.4.7-0.2mdv2007.0.x86_64.rpm
608bd0a86d6f83927466f23e7d73fa8d 2007.0/x86_64/lib64gpgme11-1.1.2-2.1mdv2007.0.x86_64.rpm
915d2d203fa41ce12bc661d1a89d563b 2007.0/x86_64/lib64gpgme11-devel-1.1.2-2.1mdv2007.0.x86_64.rpm
62d991ccd15ca77ed37ccd4ca1bedba7 2007.0/SRPMS/gnupg-1.4.7-0.2mdv2007.0.src.rpm
31357e977acd83d777df2d77c22094f6 2007.0/SRPMS/gpgme-1.1.2-2.1mdv2007.0.src.rpm

Corporate 3.0:
36afcf2ffb12348fccdfba01b485d7fc corporate/3.0/i586/gnupg-1.4.7-0.2.C30mdk.i586.rpm
ec3c9d7bf56e941e2f92a92caa8ac812 corporate/3.0/SRPMS/gnupg-1.4.7-0.2.C30mdk.src.rpm

Corporate 3.0/X86_64:
250e2ef0d26f6d51aa175e32c04e29d0 corporate/3.0/x86_64/gnupg-1.4.7-0.2.C30mdk.x86_64.rpm
ec3c9d7bf56e941e2f92a92caa8ac812 corporate/3.0/SRPMS/gnupg-1.4.7-0.2.C30mdk.src.rpm

Corporate 4.0:
e39b79ee6122b17eaefa4abb7eec8d05 corporate/4.0/i586/gnupg-1.4.7-0.2.20060mlcs4.i586.rpm
16926c5d72457c65d89124c1ebd7d0b9 corporate/4.0/SRPMS/gnupg-1.4.7-0.2.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
810b054fed4d7c0b2c8605bb7c3efdca corporate/4.0/x86_64/gnupg-1.4.7-0.2.20060mlcs4.x86_64.rpm
16926c5d72457c65d89124c1ebd7d0b9 corporate/4.0/SRPMS/gnupg-1.4.7-0.2.20060mlcs4.src.rpm

Multi Network Firewall 2.0:
014a4338ad09dca79149509a1a0a2050 mnf/2.0/i586/gnupg-1.4.7-0.3.M20mdk.i586.rpm
d513a1498ccd2ee5661fb6a9e80c5230 mnf/2.0/SRPMS/gnupg-1.4.7-0.3.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

https://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFF8LvpmqjQ0CJFipgRAk5yAJ4mihFJrRV8cInt9tK3IOogC6wB3gCgjW0c
eMLhgVvm4msQrd936ApOrYE=
=vufo
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close