Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2006-3082

Опубликовано: 19 июн. 2006
Источник: nvd
CVSS2: 5
EPSS Средний

Описание

parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*
Версия до 1.9.20 (включая)
cpe:2.3:a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:*

EPSS

Процентиль: 96%
0.23123
Средний

5 Medium

CVSS2

Дефекты

CWE-189

Связанные уязвимости

ubuntu
около 19 лет назад

parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.

redhat
около 19 лет назад

parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.

debian
около 19 лет назад

parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, ...

github
больше 3 лет назад

parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.

EPSS

Процентиль: 96%
0.23123
Средний

5 Medium

CVSS2

Дефекты

CWE-189
Уязвимость CVE-2006-3082