10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.056 Low
EPSS
Percentile
93.2%
A “stack overwrite” vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x
before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute
arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference
a function pointer from deallocated stack memory.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 6.06 | noarch | gnupg | < 1.4.2.2-1ubuntu2.5 | UNKNOWN |
ubuntu | 6.10 | noarch | gnupg | < 1.4.3-2ubuntu3.3 | UNKNOWN |
ubuntu | 7.04 | noarch | gnupg | < 1.4.6-1ubuntu2 | UNKNOWN |
ubuntu | 7.10 | noarch | gnupg | < 1.4.6-1ubuntu2 | UNKNOWN |
ubuntu | 8.04 | noarch | gnupg | < 1.4.6-1ubuntu2 | UNKNOWN |
ubuntu | 8.10 | noarch | gnupg | < 1.4.6-1ubuntu2 | UNKNOWN |
ubuntu | 9.04 | noarch | gnupg | < 1.4.6-1ubuntu2 | UNKNOWN |
ubuntu | 9.10 | noarch | gnupg | < 1.4.6-1ubuntu2 | UNKNOWN |
ubuntu | 6.10 | noarch | gnupg2 | < 1.9.21-0ubuntu5.3 | UNKNOWN |
ubuntu | 7.04 | noarch | gnupg2 | < 2.0.3-1ubuntu1 | UNKNOWN |