{"id":105,"date":"2006-04-07T03:31:11","date_gmt":"2006-04-07T03:31:11","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/04\/serious-vulnerabilityflaw-found-in-gpg-gnupg\/"},"modified":"2015-09-09T19:44:02","modified_gmt":"2015-09-09T11:44:02","slug":"serious-vulnerabilityflaw-found-in-gpg-gnupg","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/04\/serious-vulnerabilityflaw-found-in-gpg-gnupg\/","title":{"rendered":"Serious Vulnerability\/Flaw Found in GPG – GnuPG"},"content":{"rendered":"
[ad]<\/p>\n
Just in case you didn’t read it, found this one in the archives.<\/p>\n
A serious problem in the use of GPG to verify digital signatures has been discovered, which also affects the use of gpg in email. It is possible for an attacker to take any signed message and inject extra arbitrary data without affecting the signed status of the message. Depending on how gpg is invoked, it may be possible to output just faked data as several variants of this attack have been discovered. All versions of gnupg prior to 1.4.2.2 are affected, and it is thus recommended to update GnuPG as soon as possible to version 1.4.2.2<\/a><\/p><\/blockquote>\n