Vulnerability CVE-2018-12020


Published: 2018-06-08

Description:
mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.

Type:

CWE-706

(Use of Incorrectly-Resolved Name or Reference)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Redhat -> Enterprise linux desktop 
Redhat -> Enterprise linux server 
Redhat -> Enterprise linux workstation 
Redhat -> Enterprise linux server aus 
Redhat -> Enterprise linux server eus 
Redhat -> Enterprise linux server tus 
Gnupg -> Gnupg 
Debian -> Debian linux 
Canonical -> Ubuntu 
Canonical -> Ubuntu linux 

 References:
http://openwall.com/lists/oss-security/2018/06/08/2
http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
http://seclists.org/fulldisclosure/2019/Apr/38
http://www.openwall.com/lists/oss-security/2019/04/30/4
http://www.securityfocus.com/bid/104450
http://www.securitytracker.com/id/1041051
https://access.redhat.com/errata/RHSA-2018:2180
https://access.redhat.com/errata/RHSA-2018:2181
https://dev.gnupg.org/T4012
https://github.com/RUB-NDS/Johnny-You-Are-Fired
https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
https://usn.ubuntu.com/3675-1/
https://usn.ubuntu.com/3675-2/
https://usn.ubuntu.com/3675-3/
https://usn.ubuntu.com/3964-1/
https://www.debian.org/security/2018/dsa-4222
https://www.debian.org/security/2018/dsa-4223
https://www.debian.org/security/2018/dsa-4224

Copyright 2024, cxsecurity.com

 

Back to Top