CVE-2018-1000858

GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
CSRF
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 33%
VendorProductVersion
gnupggnupg
2.1.12 ≤
𝑥
≤ 2.2.11
canonicalubuntu_linux
18.04
canonicalubuntu_linux
18.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gnupg1
bookworm
1.4.23-1.1
fixed
bullseye
1.4.23-1.1
fixed
stretch
no-dsa
jessie
not-affected
sid
1.4.23-2
fixed
trixie
1.4.23-2
fixed
gnupg2
bullseye (security)
2.2.27-2+deb11u2
fixed
bullseye
2.2.27-2+deb11u2
fixed
stretch
no-dsa
jessie
not-affected
bookworm
2.2.40-1.1
fixed
trixie
2.2.44-1
fixed
sid
2.2.45-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gnupg2
cosmic
Fixed 2.2.8-3ubuntu1.1
released
bionic
Fixed 2.2.4-1ubuntu1.2
released
xenial
not-affected
trusty
dne