{"api_version":"1","generated_at":"2026-04-23T04:21:02+00:00","cve":"CVE-2003-0255","urls":{"html":"https://cve.report/CVE-2003-0255","api":"https://cve.report/api/cve/CVE-2003-0255.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2003-0255","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2003-0255"},"summary":{"title":"CVE-2003-0255","description":"The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path.","state":"PUBLISHED","assigner":"mitre","published_at":"2003-05-27 04:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://marc.info/?l=bugtraq&m=105362224514081&w=2","name":"http://marc.info/?l=bugtraq&m=105362224514081&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'[slackware-security]  GnuPG key validation fix (SSA:2003-141-04)' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.turbolinux.com/security/TLSA-2003-34.txt","name":"http://www.turbolinux.com/security/TLSA-2003-34.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"404 Not Found","mime":"text/plain","httpstatus":"404","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2003:061","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2003:061","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Mandriva Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.linuxsecurity.com/advisories/engarde_advisory-3258.html","name":"http://www.linuxsecurity.com/advisories/engarde_advisory-3258.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"LinuxSecurity.com: EnGarde:  'gnupg' key validation bug","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/7497","name":"http://www.securityfocus.com/bid/7497","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"GNU Privacy Guard Insecure Trust Path To User ID Weakness","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000694","name":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000694","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Home - Conectiva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=105301357425157&w=2","name":"http://marc.info/?l=bugtraq&m=105301357425157&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'[ESA-20030515-016] 'gnupg' key validation bug.' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A135","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A135","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2003-176.html","name":"http://www.redhat.com/support/errata/RHSA-2003-176.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=105215110111174&w=2","name":"http://marc.info/?l=bugtraq&m=105215110111174&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'Key validity bug in GnuPG 1.2.1 and earlier' - MARC","mime":"text/x-diff","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=105311804129104&w=2","name":"http://marc.info/?l=bugtraq&m=105311804129104&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'[OpenPKG-SA-2003.029] OpenPKG Security Advisory (gnupg)' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/397604","name":"http://www.kb.cert.org/vuls/id/397604","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"],"title":"CERT/CC Vulnerability Note VU#397604","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2003-175.html","name":"http://www.redhat.com/support/errata/RHSA-2003-175.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.linuxsecurity.com/advisories/gentoo_advisory-3266.html","name":"http://www.linuxsecurity.com/advisories/gentoo_advisory-3266.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"LinuxSecurity.com: Gentoo: gnupg key validation bug","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11930","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11930","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/4947","name":"http://www.osvdb.org/4947","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2003-0255","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2003-0255","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2003","cve_id":"255","vulnerable":"1","versionEndIncluding":"1.2.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"privacy_guard","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T01:50:46.897Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"TLSA200334","tags":["vendor-advisory","x_refsource_TURBO","x_transferred"],"url":"http://www.turbolinux.com/security/TLSA-2003-34.txt"},{"name":"RHSA-2003:175","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2003-175.html"},{"name":"4947","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/4947"},{"name":"oval:org.mitre.oval:def:135","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A135"},{"name":"20030522 [slackware-security]  GnuPG key validation fix (SSA:2003-141-04)","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=105362224514081&w=2"},{"name":"7497","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/7497"},{"name":"20030516 [OpenPKG-SA-2003.029] OpenPKG Security Advisory (gnupg)","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=105311804129104&w=2"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.linuxsecurity.com/advisories/gentoo_advisory-3266.html"},{"name":"MDKSA-2003:061","tags":["vendor-advisory","x_refsource_MANDRAKE","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2003:061"},{"name":"gnupg-invalid-key-acceptance(11930)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11930"},{"name":"CLA-2003:694","tags":["vendor-advisory","x_refsource_CONECTIVA","x_transferred"],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000694"},{"name":"RHSA-2003:176","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2003-176.html"},{"name":"20030515-016","tags":["vendor-advisory","x_refsource_ENGARDE","x_transferred"],"url":"http://www.linuxsecurity.com/advisories/engarde_advisory-3258.html"},{"name":"ESA-20030515-016","tags":["vendor-advisory","x_refsource_ENGARDE","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=105301357425157&w=2"},{"name":"VU#397604","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/397604"},{"name":"20030504 Key validity bug in GnuPG 1.2.1 and earlier","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=105215110111174&w=2"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2003-05-04T00:00:00.000Z","descriptions":[{"lang":"en","value":"The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-10-10T00:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"TLSA200334","tags":["vendor-advisory","x_refsource_TURBO"],"url":"http://www.turbolinux.com/security/TLSA-2003-34.txt"},{"name":"RHSA-2003:175","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2003-175.html"},{"name":"4947","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/4947"},{"name":"oval:org.mitre.oval:def:135","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A135"},{"name":"20030522 [slackware-security]  GnuPG key validation fix (SSA:2003-141-04)","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=105362224514081&w=2"},{"name":"7497","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/7497"},{"name":"20030516 [OpenPKG-SA-2003.029] OpenPKG Security Advisory (gnupg)","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=105311804129104&w=2"},{"tags":["x_refsource_MISC"],"url":"http://www.linuxsecurity.com/advisories/gentoo_advisory-3266.html"},{"name":"MDKSA-2003:061","tags":["vendor-advisory","x_refsource_MANDRAKE"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2003:061"},{"name":"gnupg-invalid-key-acceptance(11930)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11930"},{"name":"CLA-2003:694","tags":["vendor-advisory","x_refsource_CONECTIVA"],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000694"},{"name":"RHSA-2003:176","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2003-176.html"},{"name":"20030515-016","tags":["vendor-advisory","x_refsource_ENGARDE"],"url":"http://www.linuxsecurity.com/advisories/engarde_advisory-3258.html"},{"name":"ESA-20030515-016","tags":["vendor-advisory","x_refsource_ENGARDE"],"url":"http://marc.info/?l=bugtraq&m=105301357425157&w=2"},{"name":"VU#397604","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/397604"},{"name":"20030504 Key validity bug in GnuPG 1.2.1 and earlier","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=105215110111174&w=2"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2003-0255","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"TLSA200334","refsource":"TURBO","url":"http://www.turbolinux.com/security/TLSA-2003-34.txt"},{"name":"RHSA-2003:175","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2003-175.html"},{"name":"4947","refsource":"OSVDB","url":"http://www.osvdb.org/4947"},{"name":"oval:org.mitre.oval:def:135","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A135"},{"name":"20030522 [slackware-security]  GnuPG key validation fix (SSA:2003-141-04)","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=105362224514081&w=2"},{"name":"7497","refsource":"BID","url":"http://www.securityfocus.com/bid/7497"},{"name":"20030516 [OpenPKG-SA-2003.029] OpenPKG Security Advisory (gnupg)","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=105311804129104&w=2"},{"name":"http://www.linuxsecurity.com/advisories/gentoo_advisory-3266.html","refsource":"MISC","url":"http://www.linuxsecurity.com/advisories/gentoo_advisory-3266.html"},{"name":"MDKSA-2003:061","refsource":"MANDRAKE","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2003:061"},{"name":"gnupg-invalid-key-acceptance(11930)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11930"},{"name":"CLA-2003:694","refsource":"CONECTIVA","url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000694"},{"name":"RHSA-2003:176","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2003-176.html"},{"name":"20030515-016","refsource":"ENGARDE","url":"http://www.linuxsecurity.com/advisories/engarde_advisory-3258.html"},{"name":"ESA-20030515-016","refsource":"ENGARDE","url":"http://marc.info/?l=bugtraq&m=105301357425157&w=2"},{"name":"VU#397604","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/397604"},{"name":"20030504 Key validity bug in GnuPG 1.2.1 and earlier","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=105215110111174&w=2"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2003-0255","datePublished":"2003-05-07T04:00:00.000Z","dateReserved":"2003-05-06T00:00:00.000Z","dateUpdated":"2024-08-08T01:50:46.897Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2003-05-27 04:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:privacy_guard:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.1","matchCriteriaId":"377F09FD-8BC6-45D2-8712-2180DBEA3F84"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2003","CveId":"255","Ordinal":"1","Title":"CVE-2003-0255","CVE":"CVE-2003-0255","Year":"2003"},"notes":[{"CveYear":"2003","CveId":"255","Ordinal":"1","NoteData":"The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path.","Type":"Description","Title":"CVE-2003-0255"},{"CveYear":"2003","CveId":"255","Ordinal":"2","NoteData":"2003-05-07","Type":"Other","Title":"Published"},{"CveYear":"2003","CveId":"255","Ordinal":"3","NoteData":"2017-10-09","Type":"Other","Title":"Modified"}]}}}