vulnerability

Debian: CVE-2018-12020: enigmail, gnupg1, gnupg2 -- security update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
2018-06-08
Added
2018-06-09
Modified
2024-11-27

Description

mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.

Solution(s)

debian-upgrade-enigmaildebian-upgrade-gnupg1debian-upgrade-gnupg2
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.