Lucene search

K
f5F5F5:K40131068
HistoryFeb 19, 2016 - 12:00 a.m.

K40131068 : GnuPG vulnerability CVE-2013-4402

2016-02-1900:00:00
my.f5.com
8

8.2 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.045 Low

EPSS

Percentile

91.6%

Security Advisory Description

The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message. (CVE-2013-4402)
Impact
A remote attacker may exploit this flaw by way of a specially crafted OpenPGP message to cause a denial-of-service (DoS) attack.
Note: While the vulnerable code exists in F5 products, the code is not used directly in processing encrypted traffic, nor is it used as part of the default traffic processing configuration.

8.2 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.045 Low

EPSS

Percentile

91.6%