Global Information Lookup Global Information

SigSpoof information


SigSpoof
CVE identifier(s)CVE-2018-12020
Date discoveredJune 2018; 5 years ago (2018-06)
DiscovererMarcus Brinkmann
Affected softwareGNU Privacy Guard (GnuPG) from v0.2.2 to v2.2.8.

SigSpoof (CVE-2018-12020) is a family of security vulnerabilities that affected the software package GNU Privacy Guard ("GnuPG") since version 0.2.2, that was released in 1998.[1] Several other software packages that make use of GnuPG were also affected, such as Pass and Enigmail.[2][1]

In un-patched versions of affected software, SigSpoof attacks allow cryptographic signatures to be convincingly spoofed, under certain circumstances.[1][3][4][2][5] This potentially enables a wide range of subsidiary attacks to succeed.[1][3][4][2][5]

  1. ^ a b c d Cite error: The named reference ars was invoked but never defined (see the help page).
  2. ^ a b c Cite error: The named reference reg-2018-06-19 was invoked but never defined (see the help page).
  3. ^ a b Cite error: The named reference golem was invoked but never defined (see the help page).
  4. ^ a b Cite error: The named reference heise was invoked but never defined (see the help page).
  5. ^ a b Cite error: The named reference standard was invoked but never defined (see the help page).

and 25 Related for: SigSpoof information

Request time (Page generated in 0.585 seconds.)

SigSpoof

Last Update:

SigSpoof (CVE-2018-12020) is a family of security vulnerabilities that affected the software package GNU Privacy Guard ("GnuPG") since version 0.2.2, that...

Word Count : 185

GNU Privacy Guard

Last Update:

susceptible. Around June 2018, the SigSpoof attacks were announced. These allowed an attacker to convincingly spoof digital signatures. In January 2021...

Word Count : 2615

Emotet

Last Update:

Speculative Store Bypass (2018) Lazy FP state restore (2018) TLBleed (2018) SigSpoof (2018) Foreshadow (2018) Dragonblood (2019) Microarchitectural Data Sampling...

Word Count : 907

Cyber Anakin

Last Update:

@juche_school (without the number 1). As an "April Fools prank" he registered a spoof account under that empty username and posted numerous anti-DPRK propaganda...

Word Count : 2383

Susquehanna International Group

Last Update:

Susquehanna International Group, LLP (SIG) is a privately held, global trading and technology firm. SIG comprises a number of affiliated entities specializing...

Word Count : 783

FV Northwestern

Last Update:

Crabby the Boat in the film Cars 2 and was voiced by Sig Hansen. The comedy show South Park briefly spoofed the vessel and its workers in the episode "Whale...

Word Count : 1373

Bluetooth

Last Update:

headphones. Bluetooth is managed by the Bluetooth Special Interest Group (SIG), which has more than 35,000 member companies in the areas of telecommunication...

Word Count : 13894

Audio deepfake

Last Update:

social media platforms. People can use them as a logical access voice spoofing technique, where they can be used to manipulate public opinion for propaganda...

Word Count : 4439

List of political disinformation website campaigns

Last Update:

(2019-03-29). "Sådan svarer 24NYT på kritik af fake news – vil ikke lade sig diktere af »såkaldte medieeksperter«". Berlingske (in Danish). Archived from...

Word Count : 3548

IBeacon

Last Update:

Manufacturer Data) Byte 5-6: Manufacturer ID : 0x4c00 (Apple's Bluetooth SIG registered company code, 16-bit Little Endian) Byte 7: SubType: 0x02 (Apple's...

Word Count : 2896

United States Secret Service

Last Update:

Secret Service's current duty sidearm, the SIG-Sauer P229 double-action/single-action pistol chambered in .357 SIG, entered service in 1999. It is the issued...

Word Count : 9149

List of equipment of the Turkish Land Forces

Last Update:

com. 26 May 2014. Retrieved 9 May 2022. "Buy This Gun if You Can't Get a Sig Sauer or Glock". 22 June 2019. Dabbs, Will (11 February 2018). "The Evolution...

Word Count : 6237

List of Maverick episodes

Last Update:

thwarted by a square-jawed, upstanding lawman. This is Maverick's Gunsmoke spoof, with Ben Gage as Marshal Mort Dooley (a comical version of Marshal Matt...

Word Count : 988

Portal 2

Last Update:

April 15, the players discovered "GLaDOS@Home", a distributed computing spoof that encouraged participants to play the games to unlock Portal 2 early...

Word Count : 17024

Peter Lorre

Last Update:

musical comedy mystery vehicle for bandleader Kay Kyser in which Lorre spoofed his sinister image alongside horror stars Bela Lugosi and Boris Karloff...

Word Count : 4060

Robin and the 7 Hoods

Last Update:

Kelley as Police Chief Maurice Manson as Dignitary Tony Randall as Hood Sig Ruman as Hammacher Bill Zuckert as Jury Foreman Cast notes Peter Lawford...

Word Count : 2399

List of humorous units of measurement

Last Update:

Defined as the distance the king's favorite pet can run in one hour (spoofing a popular legend about the history of the foot), the length of the bloit...

Word Count : 4784

Basil Rathbone

Last Update:

ran for only three performances. In the 1950s, Rathbone appeared in two spoofs of his earlier swashbuckling villains: Casanova's Big Night (1954) opposite...

Word Count : 3499

List of fictional computers

Last Update:

indistinguishable from God in Mind War: The Singularity by Joseph DiBella (2010) SIG, a secretive and manipulative computer that is developed on present-day Earth...

Word Count : 15085

The Emperor Waltz

Last Update:

Lucile Watson as Princess Bitotska Richard Haydn as Emperor Franz Joseph Sig Ruman as Dr. Zwieback Harold Vermilyea as Chamberlain Julia Dean as Archduchess...

Word Count : 2287

Public key infrastructure

Last Update:

SSL. Retrieved 2022-05-02. "Fraudulent Digital Certificates could allow spoofing". Microsoft Security Advisory. Microsoft. March 23, 2011. Retrieved 2011-03-24...

Word Count : 4098

Ad blocking

Last Update:

Feldmann, Anja. "Annoyed Users: Ads and Ad-Block Usage in the Wild" (PDF). ACM SigComm Conference. Archived (PDF) from the original on 30 June 2016. Retrieved...

Word Count : 6146

Domain Name System Security Extensions

Last Update:

of trust. NSEC and NSEC3 records are used for robust resistance against spoofing. DNSSEC was designed to be extensible so that as attacks are discovered...

Word Count : 7733

Supermarionation

Last Update:

was inspired by Thunderbirds and has been described as an imitation or spoof of Supermarionation productions. Stone and Parker dubbed their filming process...

Word Count : 6277

Soldiers of Odin

Last Update:

2020. "Soldiers of Odin registers as NGO, warns Loldiers against using spoof name". Yle.fi. 15 February 2016. Archived from the original on 18 February...

Word Count : 2442

PDF Search Engine © AllGlobal.net