Description
gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
Published: 2006-03-13
Score: 5.0 Medium
EPSS: 5.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-993-1 New GnuPG packages fix broken signature check
Debian DSA Debian DSA DSA-993-2 New GnuPG packages fix broken signature check
EUVD EUVD EUVD-2006-0057 gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
Ubuntu USN Ubuntu USN USN-264-1 gnupg vulnerability
References
Link Providers
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U cve-icon cve-icon
http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html cve-icon cve-icon
http://lists.suse.de/archive/suse-security-announce/2006-Mar/0003.html cve-icon cve-icon
http://secunia.com/advisories/19173 cve-icon cve-icon
http://secunia.com/advisories/19197 cve-icon cve-icon
http://secunia.com/advisories/19203 cve-icon cve-icon
http://secunia.com/advisories/19231 cve-icon cve-icon
http://secunia.com/advisories/19232 cve-icon cve-icon
http://secunia.com/advisories/19234 cve-icon cve-icon
http://secunia.com/advisories/19244 cve-icon cve-icon
http://secunia.com/advisories/19249 cve-icon cve-icon
http://secunia.com/advisories/19287 cve-icon cve-icon
http://secunia.com/advisories/19532 cve-icon cve-icon
http://securityreason.com/securityalert/450 cve-icon cve-icon
http://securityreason.com/securityalert/568 cve-icon cve-icon
http://securitytracker.com/id?1015749 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-993 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200603-08.xml cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2006:055 cve-icon cve-icon
http://www.osvdb.org/23790 cve-icon cve-icon
http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00021.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0266.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/427324/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/433931/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/17058 cve-icon cve-icon
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.476477 cve-icon cve-icon
http://www.trustix.org/errata/2006/0014 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/0915 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/25184 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2006-0049 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10063 cve-icon cve-icon
https://usn.ubuntu.com/264-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2006-0049 cve-icon
History

No history.

Subscriptions

Gnu Privacy Guard
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: debian

Published:

Updated: 2024-08-07T16:18:20.663Z

Reserved: 2005-12-28T00:00:00.000Z

Link: CVE-2006-0049

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2006-03-13T21:06:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2006-0049

cve-icon Redhat

Severity : Important

Publid Date: 2006-03-09T00:00:00Z

Links: CVE-2006-0049 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses