Lucene search

K
f5F5F5:K11785283
HistoryFeb 19, 2016 - 12:00 a.m.

K11785283 : GnuPG vulnerability CVE-2012-6085

2016-02-1900:00:00
my.f5.com
9

6.1 Medium

AI Score

Confidence

Low

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.05 Low

EPSS

Percentile

92.1%

Security Advisory Description

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet. (CVE-2012-6085)
Impact
A remote attacker may exploit this vulnerability by way of a specially crafted OpenPGP packet to cause the keyring to be corrupted.
Note: This is only used directly in verification of ISOs and ASM signatures, which does open up some risk, but only during the verification process.

6.1 Medium

AI Score

Confidence

Low

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.05 Low

EPSS

Percentile

92.1%