Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2006:009: gpg,liby2util


Vulnerability Assessment Details

SUSE-SA:2006:009: gpg,liby2util

Vulnerability Assessment Summary
Check for the version of the gpg,liby2util package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2006:009 (gpg,liby2util).


With certain handcraftable signatures GPG was returning a 0 (valid
signature) when used on command-line with option --verify.

This only affects GPG version 1.4.x, so it only affects SUSE Linux
9.3 and 10.0. Other SUSE Linux versions are not affected.

This could make automated checkers, like for instance the patch file
verification checker of the YaST Online Update, pass malicious patch
files as correct.

This is tracked by the Mitre CVE ID CVE-2006-0455.

Also, the YaST Online Update script signature verification had used
a feature which was lost in gpg 1.4.x, making it possible to
supply any kind of script which would be thought correct. This would
also permit code execution.

Both attacks require a possible hacker either manipulating a YaST Online
Update mirror or manipulating the network traffic between the mirror
and your machine.


Solution : http://www.suse.de/security/advisories/2006_09_gpg.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

DELL POWEREDGE M630 E5-2603V3 1.6GHZ 64GB 2 X 600GB 15K 12G H330
$1629.0
DELL POWEREDGE M630 E5-2603V3 1.6GHZ 64GB 2 X 600GB 15K 12G H330 pictureDELL POWEREDGE M630 TWO E5-2620V3 2.4GHZ 384GB 2 X 1.8TB 10K 12G H330
$5519.0
DELL POWEREDGE M630 TWO E5-2620V3 2.4GHZ 384GB 2 X 1.8TB 10K 12G H330 pictureDELL POWEREDGE M910 SERVER FOUR E7530 1.86GHZ 32GB 480GB SSD
$1219.0
DELL POWEREDGE M910 SERVER FOUR E7530 1.86GHZ 32GB 480GB SSD pictureIBM HS22 BLADECENTER SERVER L5530 2.40GHZ 4GB RAM 2 X 600GB 10K SAS
$579.0
IBM HS22 BLADECENTER SERVER L5530 2.40GHZ 4GB RAM 2 X 600GB 10K SAS picture


Discussions

No Discussions have been posted on this vulnerability.