Family: SuSE Local Security Checks --> Category: infos
SUSE-SA:2006:014: gpg Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the gpg package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory SUSE-SA:2006:014 (gpg).
The GNU Privacy Guard (GPG) allows crafting a message which could
check out correct using '--verify', but would extract a different,
potentially malicious content when using '-o --batch'.
The reason for this is that a .gpg or .asc file can contain multiple
plain text and signature streams and the handling of these streams was
only possible when correctly following the gpg state.
The gpg '--verify' option has been changed to be way more strict than
before and fail on files with multiple signatures/blocks to mitigate
the problem of doing the common --verify checks and -o extraction.
This problem could be used by a possible hacker to remotely execute code
by using handcrafted YaST Online Patch files put onto a compromised
YOU mirror server and waiting for the user to run YOU.
This problem is tracked by the Mitre CVE ID CVE-2006-0049.
This is a different issue than the gpg signature checking problem for
Solution : http://www.suse.de/security/advisories/2006_14_gpg.html
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.