Lucene search

K
ubuntuUbuntuUSN-393-2
HistoryDec 07, 2006 - 12:00 a.m.

GnuPG2 vulnerabilities

2006-12-0700:00:00
ubuntu.com
27

7.6 High

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.056 Low

EPSS

Percentile

93.2%

Releases

  • Ubuntu 6.10

Details

USN-389-1 and USN-393-1 fixed vulnerabilities in gnupg. This update
provides the corresponding updates for gnupg2.

Original advisory details:

A buffer overflow was discovered in GnuPG. By tricking a user into
running gpg interactively on a specially crafted message, an attacker
could execute arbitrary code with the user’s privileges. This
vulnerability is not exposed when running gpg in batch mode.
(CVE-2006-6169)

Tavis Ormandy discovered that gnupg was incorrectly using the stack.
If a user were tricked into processing a specially crafted message, an
attacker could execute arbitrary code with the user’s privileges.
(CVE-2006-6235)

OSVersionArchitecturePackageVersionFilename
Ubuntu6.10noarchgnupg2< 1.9.21-0ubuntu5.2UNKNOWN

7.6 High

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.056 Low

EPSS

Percentile

93.2%