CVE-2018-1000858

Published: 20 December 2018

GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.

Priority

Medium

CVSS 3 base score: 8.8

Status

Package Release Status
gnupg2
Launchpad, Ubuntu, Debian
Upstream
Released (2.2.12-1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.2.4-1ubuntu1.2)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(code not present)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was not-affected [code not present])
Patches:
Upstream: https://github.com/gpg/gnupg/commit/4a4bb874f63741026bd26264c43bb32b1099f060 (2.2.12)