<p>All parts of Gpg4win use the official GnuPG Programming API (GPGME) and
as such are not affected by GnuPG output parsing problems. GPGME
handles all parsing of GnuPG output itself and provides a C API
to access it.</p>
<h3>MIME attacks and GpgOL</h3>
<p>GpgOL uses a MIME parser that avoids displaying
complicated MIME structure and was not affected by this class of attacks.</p>
<h3>CMS attacks and GpgOL</h3>
<p>GpgOL is not affected by the CMS attack classes as it
replaces the content of a mail with the data that was
actually used for verification. Certificate validation
is correctly handled by GpgSM.</p>
<h3>Timeline and references</h3>
<ul><li>2018-06-08 GnuPG-Team notified by an implementor about CVE-2018-12020.
</li><li>2018-06-08 Fix for CVE-2018-12020 released and announced.
</li><li>2018-06-13 Publication of blog entry for CVE-2018-12020.
</li><li>2018-09-25 Researchers notified Gpg4win-Team about
"Display Name shown as Signer (I2)" defect.
</li><li>2018-10-17 Fixed version of Gpg4win released.
</li><li>2019-03-13 Preliminary access to article via the German BSI.
</li><li>2019-04-30 Publication of research article.
</li></ul>
<p>[1] <a href="https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf">'Johnny you are fired' – Spoofing OpenPGP and S/MIME Signatures in Emails, Müller et. al. 2019</a>