Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-1530

Опубликовано: 27 мар. 2008
Источник: debian
EPSS Низкий

Описание

GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnupgnot-affectedpackage
gnupgnot-affectedetchpackage
gnupgnot-affectedsargepackage
gnupg2fixed2.0.9-1package
gnupg2not-affectedetchpackage
gnupg2not-affectedsargepackage

Примечания

  • The next upload was 1.4.9-1, so no vulnerable version was ever in the

  • archive

EPSS

Процентиль: 87%
0.03697
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."

nvd
больше 17 лет назад

GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."

github
больше 3 лет назад

GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."

EPSS

Процентиль: 87%
0.03697
Низкий