Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-6085

Опубликовано: 24 янв. 2013
Источник: debian
EPSS Низкий

Описание

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnupgfixed1.4.12-7package
gnupg2fixed2.0.19-2package

EPSS

Процентиль: 85%
0.02443
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

redhat
больше 12 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

nvd
больше 12 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

github
больше 3 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

oracle-oval
почти 12 лет назад

ELSA-2013-1459: gnupg2 security update (MODERATE)

EPSS

Процентиль: 85%
0.02443
Низкий