Vulnerability Details : CVE-2007-1266
Evolution 2.8.1 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Evolution from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.
Products affected by CVE-2007-1266
- cpe:2.3:a:gnome:evolution:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-1266
5.70%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-1266
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2007-1266
-
http://www.securityfocus.com/bid/22760
-
http://securityreason.com/securityalert/2353
GnuPG and GnuPG clients unsigned data injection vulnerability - CXSecurity.com
-
http://www.securityfocus.com/archive/1/461958/100/0/threaded
-
http://www.vupen.com/english/advisories/2007/0835
Site en construction
-
http://www.coresecurity.com/?action=item&id=1687
Core Security | Cyber Threat Prevention & Identity GovernanceExploit;Patch;Vendor Advisory
-
http://www.securityfocus.com/archive/1/461958/30/7710/threaded
-
http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html
[Announce] Multiple Messages Problem in GnuPG and GPGME
-
http://www.securitytracker.com/id?1017727
GoDaddy Domain Name Search
Jump to