Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html http://www.vuxml.org/freebsd/948921ad-afbc-11da-bad9-02e081235dab.html
Insight
The following package is affected: gnupg
CVE-2006-0049
gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
Severity
Classification
-
CVE CVE-2006-0049 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:P/A:N
Related Vulnerabilities