Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5m4p-hwr3-qvm6

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

EPSS

Процентиль: 85%
0.02443
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 12 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

redhat
больше 12 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

nvd
больше 12 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

debian
больше 12 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 a ...

oracle-oval
почти 12 лет назад

ELSA-2013-1459: gnupg2 security update (MODERATE)

EPSS

Процентиль: 85%
0.02443
Низкий

Дефекты

CWE-20