Lucene search

K
ubuntuUbuntuUSN-332-1
HistoryAug 03, 2006 - 12:00 a.m.

gnupg vulnerability

2006-08-0300:00:00
ubuntu.com
37

6.7 Medium

AI Score

Confidence

Low

0.896 High

EPSS

Percentile

98.8%

Releases

  • Ubuntu 6.06
  • Ubuntu 5.10
  • Ubuntu 5.04

Details

Evgeny Legerov discovered that gnupg did not sufficiently check the
validity of the comment and a control field. Specially crafted GPG
data could cause a buffer overflow. This could be exploited to execute
arbitrary code with the user’s privileges if an attacker can trick an
user into processing a malicious encrypted/signed document with gnupg.

OSVersionArchitecturePackageVersionFilename
Ubuntu6.06noarchgnupg< 1.4.2.2-1ubuntu2.2UNKNOWN
Ubuntu5.10noarchgnupg< 1.4.1-1ubuntu1.4UNKNOWN
Ubuntu5.04noarchgnupg< 1.2.5-3ubuntu5.5UNKNOWN