Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-1530

Опубликовано: 27 мар. 2008
Источник: debian

Описание

GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnupgnot-affectedpackage
gnupgnot-affectedetchpackage
gnupgnot-affectedsargepackage
gnupg2fixed2.0.9-1package
gnupg2not-affectedetchpackage
gnupg2not-affectedsargepackage

Примечания

  • The next upload was 1.4.9-1, so no vulnerable version was ever in the

  • archive

Связанные уязвимости

ubuntu
почти 18 лет назад

GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."

nvd
почти 18 лет назад

GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."

github
почти 4 года назад

GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."