CVE-2003-0255
Summary
| CVE | CVE-2003-0255 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2003-05-27 04:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path. |
Risk And Classification
Primary CVSS: v2.0 10 from [email protected]
AV:N/AC:L/Au:N/C:C/I:C/A:C
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Gnu | Privacy Guard | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| '[slackware-security] GnuPG key validation fix (SSA:2003-141-04)' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| 404 Not Found | af854a3a-2127-422b-91ae-364da2661108 | www.turbolinux.com | |
| Mandriva Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| LinuxSecurity.com: EnGarde: 'gnupg' key validation bug | af854a3a-2127-422b-91ae-364da2661108 | www.linuxsecurity.com | |
| GNU Privacy Guard Insecure Trust Path To User ID Weakness | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Home - Conectiva | af854a3a-2127-422b-91ae-364da2661108 | distro.conectiva.com.br | |
| '[ESA-20030515-016] 'gnupg' key validation bug.' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| 'Key validity bug in GnuPG 1.2.1 and earlier' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| '[OpenPKG-SA-2003.029] OpenPKG Security Advisory (gnupg)' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| CERT/CC Vulnerability Note VU#397604 | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | US Government Resource |
| redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Patch, Vendor Advisory |
| LinuxSecurity.com: Gentoo: gnupg key validation bug | af854a3a-2127-422b-91ae-364da2661108 | www.linuxsecurity.com | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| www.osvdb.org/4947 | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.