Описание
Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.
Ссылки
- Exploit
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:gnupg:gnupg:1.4.4:*:*:*:*:*:*:*
EPSS
Процентиль: 97%
0.33245
Средний
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
ubuntu
около 19 лет назад
Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.
redhat
около 19 лет назад
Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.
debian
около 19 лет назад
Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote a ...
github
больше 3 лет назад
Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.
EPSS
Процентиль: 97%
0.33245
Средний
5 Medium
CVSS2
Дефекты
NVD-CWE-Other