Lucene search

K
debianDebianDEBIAN:DLA-39-1:3EDBB
HistoryAug 20, 2014 - 6:35 p.m.

[DLA 39-1] gpgme1.0 security update

2014-08-2018:35:24
lists.debian.org
11

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.2

Confidence

Low

EPSS

0.036

Percentile

91.6%

Package : gpgme1.0
Version : 1.2.0-1.2+deb6u1
CVE ID : CVE-2014-3564
Debian Bug : 756651

Tomas Trnka discovered a heap-based buffer overflow within the gpgsm
status handler of GPGME, a library designed to make access to GnuPG
easier for applications. An attacker could use this issue to cause an
application using GPGME to crash (denial of service) or possibly to
execute arbitrary code.

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.2

Confidence

Low

EPSS

0.036

Percentile

91.6%