Vulnerability Name:

CVE-2000-0974 (CCN-5386)

Assigned:2000-10-12
Published:2000-10-12
Updated:2018-05-03
Summary:GnuPG (gpg) 1.0.3 does not properly check all signatures of a file containing multiple documents, which allows an attacker to modify contents of all documents but the first without detection.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Other
References:Source: CALDERA
Type: UNKNOWN
CSSA-2000-038.0

Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-00:67
gnupg fails to correctly verify signatures

Source: FREEBSD
Type: UNKNOWN
FreeBSD-SA-00:67

Source: CCN
Type: GnuPG - Download
Download

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2000-038.0
verification bug in gnupg

Source: BUGTRAQ
Type: UNKNOWN
20001011 GPG 1.0.3 doesn't detect modifications to files with multiple signatures

Source: CCN
Type: BugTraq Mailing List, Wed Oct 11 2000 - 14:30:19 CDT
GPG 1.0.3 doesn't detect modifications to files with multiple signatures

Source: CCN
Type: BugTraq Mailing List, Fri Oct 13 2000 - 11:42:04 CDT
Re: GPG 1.0.3 doesn't detect modifications to files with multiple signatures

Source: BUGTRAQ
Type: UNKNOWN
20001025 Immunix OS Security Update for gnupg package

Source: CCN
Type: Conectiva Linux Announcement CLSA-2000:334
gnupg: Signature checking bug

Source: MITRE
Type: CNA
CVE-2000-0974

Source: CONECTIVA
Type: UNKNOWN
CLSA-2000:334

Source: CCN
Type: RHSA-2000:089-04
Updated gnupg packages available

Source: DEBIAN
Type: UNKNOWN
20001111 gnupg: incorrect signature verification

Source: DEBIAN
Type: Debian Security Advisory 20001111
gnupg: incorrect signature verification

Source: OSVDB
Type: UNKNOWN
1608

Source: CCN
Type: OSVDB ID: 1608
GnuPG Multiply Signed Message Document Modification

Source: REDHAT
Type: UNKNOWN
RHSA-2000:089

Source: BID
Type: Exploit, Patch, Vendor Advisory
1797

Source: CCN
Type: BID-1797
GnuPG Multiple Signed Message Modification Vulnerability

Source: CCN
Type: BID-1829
Mandrake GnuPG Multiple Key Validation Vulnerability

Source: CCN
Type: MandrakeSoft Security Advisory MDKSA-2000:063-1
gnupg

Source: XF
Type: UNKNOWN
gnupg-message-modify(5386)

Source: XF
Type: UNKNOWN
gnupg-message-modify(5386)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gnu:privacy_guard:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.3:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnu:privacy_guard:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:caldera:openlinux:2.4:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:connectiva:linux:-:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    gnu privacy guard 1.0
    gnu privacy guard 1.0.1
    gnu privacy guard 1.0.2
    gnu privacy guard 1.0.3
    gnu privacy guard 1.0
    gnu privacy guard 1.0.1
    gnu privacy guard 1.0.2
    gnu privacy guard 1.0.3
    freebsd freebsd *
    redhat linux 6.2
    debian debian linux 2.2
    mandrakesoft mandrake linux 7.0
    caldera openlinux 2.4
    mandrakesoft mandrake linux 7.1
    connectiva linux -
    redhat linux 7
    redhat linux 7.1
    redhat linux 7.2
    redhat linux 7.3