Get a Pentest and security assessment of your IT network.

News

[Announce] [security fix] GnuPG 2.2.8 released (CVE-2018-12020)

The OpenPGP protocol allows to include the file name of the original input file into a signed or encrypted message. During decryption and verification the GPG tool can display a notice with that file name. The displayed file name is not sanitized and as such may include line feeds or other control characters. This can be used to inject terminal control sequences into the out and, worse, to fake the so-called status messages. The suggested solution is to update to GnuPG 2.2.8 or a vendor provided update.”]

Source: https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin