Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: SuSE Local Security Checks --> Category: infos

SUSE-SA:2006:014: gpg Vulnerability Scan


Vulnerability Scan Summary
Check for the version of the gpg package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory SUSE-SA:2006:014 (gpg).


The GNU Privacy Guard (GPG) allows crafting a message which could
check out correct using '--verify', but would extract a different,
potentially malicious content when using '-o --batch'.

The reason for this is that a .gpg or .asc file can contain multiple
plain text and signature streams and the handling of these streams was
only possible when correctly following the gpg state.

The gpg '--verify' option has been changed to be way more strict than
before and fail on files with multiple signatures/blocks to mitigate
the problem of doing the common --verify checks and -o extraction.

This problem could be used by a possible hacker to remotely execute code
by using handcrafted YaST Online Patch files put onto a compromised
YOU mirror server and waiting for the user to run YOU.

This problem is tracked by the Mitre CVE ID CVE-2006-0049.

This is a different issue than the gpg signature checking problem for

Solution : http://www.suse.de/security/advisories/2006_14_gpg.html
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.