CVE-2007-1267

Source
https://nvd.nist.gov/vuln/detail/CVE-2007-1267
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2007-1267.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2007-1267
Published
2007-03-06T20:19:00Z
Modified
2025-01-08T03:20:26.122705Z
Summary
[none]
Details

Sylpheed 2.2.7 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Sylpheed from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.

References

Affected packages

Debian:11 / sylpheed

Package

Name
sylpheed
Purl
pkg:deb/debian/sylpheed?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.7.0-8
3.8.0~beta1-1
3.8.0~beta1-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / sylpheed

Package

Name
sylpheed
Purl
pkg:deb/debian/sylpheed?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.8.0~beta1-1
3.8.0~beta1-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / sylpheed

Package

Name
sylpheed
Purl
pkg:deb/debian/sylpheed?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.8.0~beta1-1
3.8.0~beta1-2

Ecosystem specific

{
    "urgency": "unimportant"
}