mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 03:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://openwall.com/lists/oss-security/2018/06/08/2 - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2019/Apr/38 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2019/04/30/4 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/104450 - Broken Link | |
References | () http://www.securitytracker.com/id/1041051 - Broken Link | |
References | () https://access.redhat.com/errata/RHSA-2018:2180 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2181 - Third Party Advisory | |
References | () https://dev.gnupg.org/T4012 - Patch, Vendor Advisory | |
References | () https://github.com/RUB-NDS/Johnny-You-Are-Fired - Technical Description, Third Party Advisory | |
References | () https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf - Technical Description, Third Party Advisory | |
References | () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html - Mailing List, Third Party Advisory | |
References | () https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html - Mailing List, Vendor Advisory | |
References | () https://usn.ubuntu.com/3675-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3675-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3675-3/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3964-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4222 - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4223 - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4224 - Third Party Advisory |
Information
Published : 2018-06-08 21:29
Updated : 2024-11-21 03:44
NVD link : CVE-2018-12020
Mitre link : CVE-2018-12020
CVE.ORG link : CVE-2018-12020
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_workstation
canonical
- ubuntu_linux
gnupg
- gnupg
debian
- debian_linux
CWE
CWE-706
Use of Incorrectly-Resolved Name or Reference