Lucene search

K
ubuntucveUbuntu.comUB:CVE-2006-3082
HistoryJun 19, 2006 - 12:00 a.m.

CVE-2006-3082

2006-06-1900:00:00
ubuntu.com
ubuntu.com
11

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.603 Medium

EPSS

Percentile

97.8%

parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions,
allows remote attackers to cause a denial of service (gpg crash) and
possibly overwrite memory via a message packet with a large length (long
user ID string), which could lead to an integer overflow, as demonstrated
using the --no-armor option.

OSVersionArchitecturePackageVersionFilename
ubuntu6.06noarchgnupg< 1.4.2.2-1ubuntu2.5UNKNOWN
ubuntu6.10noarchgnupg< 1.4.3-2ubuntu3.3UNKNOWN
ubuntu7.04noarchgnupg< 1.4.6-1ubuntu2UNKNOWN
ubuntu7.10noarchgnupg< 1.4.6-1ubuntu2UNKNOWN
ubuntu8.04noarchgnupg< 1.4.6-1ubuntu2UNKNOWN
ubuntu8.10noarchgnupg< 1.4.6-1ubuntu2UNKNOWN
ubuntu9.04noarchgnupg< 1.4.6-1ubuntu2UNKNOWN
ubuntu9.10noarchgnupg< 1.4.6-1ubuntu2UNKNOWN
ubuntu6.10noarchgnupg2< 1.9.21-0ubuntu5.3UNKNOWN
ubuntu7.04noarchgnupg2< 2.0.3-1ubuntu1UNKNOWN
Rows per page:
1-10 of 151

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.603 Medium

EPSS

Percentile

97.8%