Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-1606

Опубликовано: 20 нояб. 2019
Источник: debian
EPSS Низкий

Описание

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnupg2fixed2.1.2-1experimentalpackage
gnupg2fixed2.0.26-5package
gnupg2no-dsawheezypackage
gnupg2no-dsasqueezepackage
gnupgfixed1.4.18-7package
gnupgno-dsasqueezepackage

Примечания

  • https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html

  • http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648

EPSS

Процентиль: 64%
0.00474
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 6 лет назад

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

redhat
почти 11 лет назад

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

CVSS3: 5.5
nvd
около 6 лет назад

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

CVSS3: 5.5
github
больше 3 лет назад

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

suse-cvrf
около 10 лет назад

Security update for gpg2

EPSS

Процентиль: 64%
0.00474
Низкий