CVE Vulnerabilities

CVE-2018-12020

Use of Incorrectly-Resolved Name or Reference

Published: Jun 08, 2018 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the –status-fd 2 option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.

Weakness

The product uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.

Affected Software

NameVendorStart VersionEnd Version
Enterprise_linux_desktopRedhat6.0 (including)6.0 (including)
Enterprise_linux_desktopRedhat7.0 (including)7.0 (including)
Enterprise_linux_serverRedhat6.0 (including)6.0 (including)
Enterprise_linux_serverRedhat7.0 (including)7.0 (including)
Enterprise_linux_server_ausRedhat7.6 (including)7.6 (including)
Enterprise_linux_server_eusRedhat7.5 (including)7.5 (including)
Enterprise_linux_server_eusRedhat7.6 (including)7.6 (including)
Enterprise_linux_server_tusRedhat7.6 (including)7.6 (including)
Enterprise_linux_workstationRedhat6.0 (including)6.0 (including)
Enterprise_linux_workstationRedhat7.0 (including)7.0 (including)
Red Hat Enterprise Linux 6RedHatgnupg2-0:2.0.14-9.el6_10*
Red Hat Enterprise Linux 7RedHatgnupg2-0:2.0.22-5.el7_5*
EnigmailUbuntuartful*
EnigmailUbuntubionic*
EnigmailUbuntucosmic*
EnigmailUbuntudisco*
EnigmailUbuntueoan*
EnigmailUbuntuesm-apps/bionic*
EnigmailUbuntuesm-apps/focal*
EnigmailUbuntuesm-apps/jammy*
EnigmailUbuntuesm-apps/xenial*
EnigmailUbuntufocal*
EnigmailUbuntugroovy*
EnigmailUbuntuhirsute*
EnigmailUbuntuimpish*
EnigmailUbuntujammy*
EnigmailUbuntukinetic*
EnigmailUbuntutrusty*
EnigmailUbuntuupstream*
EnigmailUbuntuxenial*
GnupgUbuntuesm-infra-legacy/trusty*
GnupgUbuntuesm-infra/xenial*
GnupgUbuntutrusty*
GnupgUbuntutrusty/esm*
GnupgUbuntuupstream*
GnupgUbuntuxenial*
Gnupg1Ubuntuartful*
Gnupg1Ubuntubionic*
Gnupg1Ubuntucosmic*
Gnupg1Ubuntudisco*
Gnupg1Ubuntuesm-apps/bionic*
Gnupg1Ubuntuupstream*
Gnupg2Ubuntuartful*
Gnupg2Ubuntubionic*
Gnupg2Ubuntucosmic*
Gnupg2Ubuntudevel*
Gnupg2Ubuntudisco*
Gnupg2Ubuntueoan*
Gnupg2Ubuntuesm-infra/bionic*
Gnupg2Ubuntuesm-infra/focal*
Gnupg2Ubuntuesm-infra/xenial*
Gnupg2Ubuntufocal*
Gnupg2Ubuntugroovy*
Gnupg2Ubuntuhirsute*
Gnupg2Ubuntuimpish*
Gnupg2Ubuntujammy*
Gnupg2Ubuntukinetic*
Gnupg2Ubuntulunar*
Gnupg2Ubuntumantic*
Gnupg2Ubuntunoble*
Gnupg2Ubuntuoracular*
Gnupg2Ubuntuplucky*
Gnupg2Ubuntuquesting*
Gnupg2Ubuntutrusty*
Gnupg2Ubuntuupstream*
Gnupg2Ubuntuxenial*
Python-gnupgUbuntuartful*
Python-gnupgUbuntubionic*
Python-gnupgUbuntucosmic*
Python-gnupgUbuntuesm-apps/bionic*
Python-gnupgUbuntuesm-apps/xenial*
Python-gnupgUbuntuesm-infra-legacy/trusty*
Python-gnupgUbuntutrusty*
Python-gnupgUbuntutrusty/esm*
Python-gnupgUbuntuupstream*
Python-gnupgUbuntuxenial*

References