Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5w36-x85h-pphm

Опубликовано: 27 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.

EPSS

Процентиль: 20%
0.00064
Низкий

8.1 High

CVSS3

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 8.1
ubuntu
11 дней назад

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.

CVSS3: 8.1
nvd
11 дней назад

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.

CVSS3: 8.1
debian
11 дней назад

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message c ...

EPSS

Процентиль: 20%
0.00064
Низкий

8.1 High

CVSS3

Дефекты

CWE-121