CVE-2003-0255
https://notcve.org/view.php?id=CVE-2003-0255
The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path. El código de validación de claves en GnuPG 1.2.2 no determina adecuadamente la validez de claves con múltiples IDs de usuario y asigna la máxima validez (de la ID de usuario más válida), lo que impide que GnuPG advierta cuando algunas de las ID no tengan un "trusted path". • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000694 http://marc.info/?l=bugtraq&m=105215110111174&w=2 http://marc.info/?l=bugtraq&m=105301357425157&w=2 http://marc.info/?l=bugtraq&m=105311804129104&w=2 http://marc.info/? •
CVE-2001-0522 – GNU Privacy Guard 1.0.x - Format String
https://notcve.org/view.php?id=CVE-2001-0522
Format string vulnerability in Gnu Privacy Guard (aka GnuPG or gpg) 1.05 and earlier can allow an attacker to gain privileges via format strings in the original filename that is stored in an encrypted file. • https://www.exploit-db.com/exploits/20889 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000399 http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-023-01 http://online.securityfocus.com/archive/1/188218 http://www.calderasystems.com/support/security/advisories/CSSA-2001-020.0.txt http://www.debian.org/security/2001/dsa-061 http://www.gnupg.org/whatsnew.html#rn20010529 http://www.kb.cert.org/vuls/id/403051 http://www.linux-mandrake.com/en/secur •
CVE-2001-0071
https://notcve.org/view.php?id=CVE-2001-0071
gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000368 http://www.debian.org/security/2000/20001225b http://www.linux-mandrake.com/en/updates/2000/MDKSA-2000-087.php3 http://www.osvdb.org/1699 http://www.redhat.com/support/errata/RHSA-2000-131.html http://www.securityfocus.com/archive/1/152197 http://www.securityfocus.com/bid/2141 https://exchange.xforce.ibmcloud.com/vulnerabilities/5802 •
CVE-2001-0072
https://notcve.org/view.php?id=CVE-2001-0072
gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000368 http://www.debian.org/security/2000/20001225b http://www.linux-mandrake.com/en/updates/2000/MDKSA-2000-087.php3 http://www.osvdb.org/1702 http://www.redhat.com/support/errata/RHSA-2000-131.html http://www.securityfocus.com/archive/1/152197 http://www.securityfocus.com/bid/2153 https://exchange.xforce.ibmcloud.com/vulnerabilities/5803 •
CVE-2000-0974
https://notcve.org/view.php?id=CVE-2000-0974
GnuPG (gpg) 1.0.3 does not properly check all signatures of a file containing multiple documents, which allows an attacker to modify contents of all documents but the first without detection. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:67.gnupg.asc ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2000-038.0.txt http://archives.neohapsis.com/archives/bugtraq/2000-10/0201.html http://archives.neohapsis.com/archives/bugtraq/2000-10/0361.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000334 http://www.debian.org/security/2000/20001111 http://www.osvdb.org/1608 http://www.redhat.com/support/errata/RHSA-2000-089.html http:/ •