Lucene search

K
gentooGentoo FoundationGLSA-200608-08
HistoryAug 05, 2006 - 12:00 a.m.

GnuPG: Integer overflow vulnerability

2006-08-0500:00:00
Gentoo Foundation
security.gentoo.org
9

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.814 High

EPSS

Percentile

98.4%

Background

The GNU Privacy Guard, GnuPG, is a free replacement for the PGP suite of cryptographic software.

Description

Evgeny Legerov discovered a vulnerability in GnuPG that when certain packets are handled an integer overflow may occur.

Impact

By sending a specially crafted email to a user running an affected version of GnuPG, a remote attacker could possibly execute arbitrary code with the permissions of the user running GnuPG.

Workaround

There is no known workaround at this time.

Resolution

All GnuPG users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose "=app-crypt/gnupg-1.4*"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-crypt/gnupg< 1.4.5UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.814 High

EPSS

Percentile

98.4%