Lucene search

K
GnupgGnupg2.0.15

5 matches found

CVE
CVE
added 2014/06/25 11:19 a.m.113 views

CVE-2014-4617

The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.

5CVSS6AI score0.08032EPSS
CVE
CVE
added 2013/08/19 11:55 p.m.102 views

CVE-2013-4242

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

1.9CVSS6AI score0.0009EPSS
CVE
CVE
added 2013/10/28 10:55 p.m.77 views

CVE-2013-4402

The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.

5CVSS7.2AI score0.04675EPSS
CVE
CVE
added 2013/10/10 12:55 a.m.74 views

CVE-2013-4351

GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.

5.8CVSS7.4AI score0.0155EPSS
CVE
CVE
added 2013/01/24 1:55 a.m.73 views

CVE-2012-6085

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

5.8CVSS7.2AI score0.02443EPSS