4.6

CVE-2006-0455

Exploit

gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded.  Note: this also occurs when running the equivalent command "gpg --verify".

Data is provided by the National Vulnerability Database (NVD)
GnuPrivacy Guard Version1.0
GnuPrivacy Guard Version1.0.1
GnuPrivacy Guard Version1.0.2
GnuPrivacy Guard Version1.0.3
GnuPrivacy Guard Version1.0.3b
GnuPrivacy Guard Version1.0.4
GnuPrivacy Guard Version1.0.5
GnuPrivacy Guard Version1.0.6
GnuPrivacy Guard Version1.0.7
GnuPrivacy Guard Version1.2
GnuPrivacy Guard Version1.2.1
GnuPrivacy Guard Version1.2.2
GnuPrivacy Guard Version1.2.2 Updaterc1
GnuPrivacy Guard Version1.2.3
GnuPrivacy Guard Version1.2.4
GnuPrivacy Guard Version1.2.5
GnuPrivacy Guard Version1.2.6
GnuPrivacy Guard Version1.2.7
GnuPrivacy Guard Version1.3.3
GnuPrivacy Guard Version1.3.4
GnuPrivacy Guard Version1.4
GnuPrivacy Guard Version1.4.1
GnuPrivacy Guard Version1.4.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 2.21% 0.838
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.6 3.9 6.4
AV:L/AC:L/Au:N/C:P/I:P/A:P