SigSpoof
{{Technical|date=September 2018}}
{{short description|Security vulnerabilities that affected GNU Privacy Guard}}
{{Use dmy dates|date=July 2019|cs1-dates=y}}
{{Infobox bug
| name = SigSpoof
| image =
| caption =
| CVE = {{CVE|2018-12020}}
| discovered = {{Start date and age|2018|06|}}
| patched =
| discoverer = Marcus Brinkmann
| affected software = GNU Privacy Guard (GnuPG) from v0.2.2 to v2.2.8.
| website =
}}
SigSpoof ({{CVE|2018-12020}}) is a family of security vulnerabilities that affected the software package GNU Privacy Guard ("GnuPG") since version 0.2.2, that was released in 1998. Several other software packages that make use of GnuPG were also affected, such as Pass and Enigmail.
In un-patched versions of affected software, SigSpoof attacks allow cryptographic signatures to be convincingly spoofed, under certain circumstances. This potentially enables a wide range of subsidiary attacks to succeed.
References
{{reflist|refs=
}}
{{Hacking in the 2010s}}
Category:Computer security exploits
{{computer-security-stub}}