This article may be too technical for most readers to understand. Please help improve it to make it understandable to non-experts, without removing the technical details.(September 2018) (Learn how and when to remove this message)
Security vulnerabilities that affected GNU Privacy Guard
SigSpoof
CVE identifier(s)
CVE-2018-12020
Date discovered
June 2018; 5 years ago (2018-06)
Discoverer
Marcus Brinkmann
Affected software
GNU Privacy Guard (GnuPG) from v0.2.2 to v2.2.8.
SigSpoof (CVE-2018-12020) is a family of security vulnerabilities that affected the software package GNU Privacy Guard ("GnuPG") since version 0.2.2, that was released in 1998.[1] Several other software packages that make use of GnuPG were also affected, such as Pass and Enigmail.[2][1]
In un-patched versions of affected software, SigSpoof attacks allow cryptographic signatures to be convincingly spoofed, under certain circumstances.[1][3][4][2][5] This potentially enables a wide range of subsidiary attacks to succeed.[1][3][4][2][5]
^ abcdCite error: The named reference ars was invoked but never defined (see the help page).
^ abcCite error: The named reference reg-2018-06-19 was invoked but never defined (see the help page).
^ abCite error: The named reference golem was invoked but never defined (see the help page).
^ abCite error: The named reference heise was invoked but never defined (see the help page).
^ abCite error: The named reference standard was invoked but never defined (see the help page).
SigSpoof (CVE-2018-12020) is a family of security vulnerabilities that affected the software package GNU Privacy Guard ("GnuPG") since version 0.2.2, that...
susceptible. Around June 2018, the SigSpoof attacks were announced. These allowed an attacker to convincingly spoof digital signatures. In January 2021...
@juche_school (without the number 1). As an "April Fools prank" he registered a spoof account under that empty username and posted numerous anti-DPRK propaganda...
Susquehanna International Group, LLP (SIG) is a privately held, global trading and technology firm. SIG comprises a number of affiliated entities specializing...
Crabby the Boat in the film Cars 2 and was voiced by Sig Hansen. The comedy show South Park briefly spoofed the vessel and its workers in the episode "Whale...
headphones. Bluetooth is managed by the Bluetooth Special Interest Group (SIG), which has more than 35,000 member companies in the areas of telecommunication...
social media platforms. People can use them as a logical access voice spoofing technique, where they can be used to manipulate public opinion for propaganda...
(2019-03-29). "Sådan svarer 24NYT på kritik af fake news – vil ikke lade sig diktere af »såkaldte medieeksperter«". Berlingske (in Danish). Archived from...
Manufacturer Data) Byte 5-6: Manufacturer ID : 0x4c00 (Apple's Bluetooth SIG registered company code, 16-bit Little Endian) Byte 7: SubType: 0x02 (Apple's...
Secret Service's current duty sidearm, the SIG-Sauer P229 double-action/single-action pistol chambered in .357 SIG, entered service in 1999. It is the issued...
com. 26 May 2014. Retrieved 9 May 2022. "Buy This Gun if You Can't Get a Sig Sauer or Glock". 22 June 2019. Dabbs, Will (11 February 2018). "The Evolution...
thwarted by a square-jawed, upstanding lawman. This is Maverick's Gunsmoke spoof, with Ben Gage as Marshal Mort Dooley (a comical version of Marshal Matt...
April 15, the players discovered "GLaDOS@Home", a distributed computing spoof that encouraged participants to play the games to unlock Portal 2 early...
musical comedy mystery vehicle for bandleader Kay Kyser in which Lorre spoofed his sinister image alongside horror stars Bela Lugosi and Boris Karloff...
Kelley as Police Chief Maurice Manson as Dignitary Tony Randall as Hood Sig Ruman as Hammacher Bill Zuckert as Jury Foreman Cast notes Peter Lawford...
Defined as the distance the king's favorite pet can run in one hour (spoofing a popular legend about the history of the foot), the length of the bloit...
ran for only three performances. In the 1950s, Rathbone appeared in two spoofs of his earlier swashbuckling villains: Casanova's Big Night (1954) opposite...
indistinguishable from God in Mind War: The Singularity by Joseph DiBella (2010) SIG, a secretive and manipulative computer that is developed on present-day Earth...
Lucile Watson as Princess Bitotska Richard Haydn as Emperor Franz Joseph Sig Ruman as Dr. Zwieback Harold Vermilyea as Chamberlain Julia Dean as Archduchess...
SSL. Retrieved 2022-05-02. "Fraudulent Digital Certificates could allow spoofing". Microsoft Security Advisory. Microsoft. March 23, 2011. Retrieved 2011-03-24...
Feldmann, Anja. "Annoyed Users: Ads and Ad-Block Usage in the Wild" (PDF). ACM SigComm Conference. Archived (PDF) from the original on 30 June 2016. Retrieved...
of trust. NSEC and NSEC3 records are used for robust resistance against spoofing. DNSSEC was designed to be extensible so that as attacks are discovered...
was inspired by Thunderbirds and has been described as an imitation or spoof of Supermarionation productions. Stone and Parker dubbed their filming process...
2020. "Soldiers of Odin registers as NGO, warns Loldiers against using spoof name". Yle.fi. 15 February 2016. Archived from the original on 18 February...