Debian DSA-993-2 : gnupg - programming error

medium Nessus Plugin ID 22859

Synopsis

The remote Debian host is missing a security-related update.

Description

Tavis Ormandy noticed that gnupg, the GNU privacy guard - a free PGP replacement, can be tricked to emit a 'good signature' status message when a valid signature is included which does not belong to the data packet. This update basically adds fixed packages for woody whose version turned out to be vulnerable as well.

Solution

Upgrade the gnupg package.

For the old stable distribution (woody) this problem has been fixed in version 1.0.6-4woody5.

For the stable distribution (sarge) this problem has been fixed in version 1.4.1-1.sarge3.

See Also

http://www.debian.org/security/2006/dsa-993

Plugin Details

Severity: Medium

ID: 22859

File Name: debian_DSA-993.nasl

Version: 1.14

Type: local

Agent: unix

Published: 10/14/2006

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:gnupg, cpe:/o:debian:debian_linux:3.0, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Reference Information

CVE: CVE-2006-0049

DSA: 993