Lucene search

K
GnupgGnupg1.4.4

6 matches found

CVE
CVE
added 2014/06/25 11:19 a.m.113 views

CVE-2014-4617

The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.

5CVSS6AI score0.08032EPSS
CVE
CVE
added 2013/10/28 10:55 p.m.77 views

CVE-2013-4402

The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.

5CVSS7.2AI score0.04675EPSS
CVE
CVE
added 2013/12/20 9:55 p.m.75 views

CVE-2013-4576

GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not ty...

2.1CVSS5.4AI score0.00108EPSS
CVE
CVE
added 2013/10/10 12:55 a.m.74 views

CVE-2013-4351

GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.

5.8CVSS7.4AI score0.0155EPSS
CVE
CVE
added 2013/01/24 1:55 a.m.73 views

CVE-2012-6085

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

5.8CVSS7.2AI score0.02443EPSS
CVE
CVE
added 2006/07/28 9:4 p.m.60 views

CVE-2006-3746

Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.

5CVSS6.3AI score0.33245EPSS