CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
91.6%
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to “different line lengths in a specific order.”
Vendor | Product | Version | CPE |
---|---|---|---|
gnu | gpgme | * | cpe:2.3:a:gnu:gpgme:*:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 10.04 | cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:* |
canonical | ubuntu_linux | 12.04 | cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:* |
debian | debian_linux | 6.0 | cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* |
git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git%3Ba=commit%3Bh=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
seclists.org/oss-sec/2014/q3/266
www.debian.org/security/2014/dsa-3005
www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
www.osvdb.org/109699
www.securityfocus.com/bid/68990
bugzilla.redhat.com/show_bug.cgi?id=1113267