This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.
The remote Fedora Core host is missing a security update.
Tavis Ormandy discovered a flaw in the way GnuPG verifies
cryptographically signed data with inline signatures. It is possible
for an attacker to add unsigned text to a signed message in such a way
so that when the signed text is extracted, the unsigned text is
extracted as well, appearing as if it had been signed. The Common
Vulnerabilities and Exposures project assigned the name CVE-2006-0049
to this issue.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected gnupg and / or gnupg-debuginfo packages.
Risk factor :
Medium / CVSS Base Score : 5.0