CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
91.6%
Package : gpgme1.0
Version : 1.2.0-1.2+deb6u1
CVE ID : CVE-2014-3564
Debian Bug : 756651
Tomas Trnka discovered a heap-based buffer overflow within the gpgsm
status handler of GPGME, a library designed to make access to GnuPG
easier for applications. An attacker could use this issue to cause an
application using GPGME to crash (denial of service) or possibly to
execute arbitrary code.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | i386 | libgpgme11-dev | < 1.2.0-1.4+deb7u1 | libgpgme11-dev_1.2.0-1.4+deb7u1_i386.deb |
Debian | 7 | armhf | libgpgme11-dev | < 1.2.0-1.4+deb7u1 | libgpgme11-dev_1.2.0-1.4+deb7u1_armhf.deb |
Debian | 7 | armhf | libgpgme11 | < 1.2.0-1.4+deb7u1 | libgpgme11_1.2.0-1.4+deb7u1_armhf.deb |
Debian | 7 | amd64 | libgpgme11 | < 1.2.0-1.4+deb7u1 | libgpgme11_1.2.0-1.4+deb7u1_amd64.deb |
Debian | 7 | mips | libgpgme11 | < 1.2.0-1.4+deb7u1 | libgpgme11_1.2.0-1.4+deb7u1_mips.deb |
Debian | 7 | amd64 | libgpgme11-dev | < 1.2.0-1.4+deb7u1 | libgpgme11-dev_1.2.0-1.4+deb7u1_amd64.deb |
Debian | 6 | amd64 | libgpgme11 | < 1.2.0-1.2+deb6u1 | libgpgme11_1.2.0-1.2+deb6u1_amd64.deb |
Debian | 7 | kfreebsd-i386 | libgpgme11-dev | < 1.2.0-1.4+deb7u1 | libgpgme11-dev_1.2.0-1.4+deb7u1_kfreebsd-i386.deb |
Debian | 7 | sparc | libgpgme11-dev | < 1.2.0-1.4+deb7u1 | libgpgme11-dev_1.2.0-1.4+deb7u1_sparc.deb |
Debian | 7 | powerpc | libgpgme11 | < 1.2.0-1.4+deb7u1 | libgpgme11_1.2.0-1.4+deb7u1_powerpc.deb |