Lucene search

K
mageiaGentoo FoundationMGASA-2014-0498
HistoryNov 26, 2014 - 8:29 p.m.

Updated libksba packages fix security vulnerability

2014-11-2620:29:06
Gentoo Foundation
advisories.mageia.org
7

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.6%

By using special crafted S/MIME messages or ECC based OpenPGP data, it is possible to create a buffer overflow, which could lead to a denial of service (CVE-2014-9087).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchlibksba< 1.3.2-1libksba-1.3.2-1.mga3
Mageia4noarchlibksba< 1.3.2-1libksba-1.3.2-1.mga4

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.6%