2 results (0.002 seconds)

CVSS: 7.8EPSS: 3%CPEs: 26EXPL: 0

KMail 1.9.5 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents KMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection. KMail 1.9.5 y anteriores no utiliza adecuadamente el argumento --status-fd al invocar a GnuPG, lo cual provoca que KMail no distinga visualmente entre trozos firmados y no firmados de mensajes OpenPGP con múltiples componentes, lo cual permite a atacantes remotos falsificar el contenido de un mensaje si ser detectado. • http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html http://secunia.com/advisories/24413 http://securityreason.com/securityalert/2353 http://www.coresecurity.com/?action=item&id=1687 http://www.securityfocus.com/archive/1/461958/100/0/threaded http://www.securityfocus.com/archive/1/461958/30/7710/threaded http://www.securityfocus.com/bid/22759 http://www.securitytracker.com/id?1017727 http://www.vupen.com/english/advisories/2007/0835 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 2

KDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories. • https://www.exploit-db.com/exploits/19240 http://www.redhat.com/support/errata/RHSA1999015_01.html http://www.securityfocus.com/bid/300 •