Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-6085

Опубликовано: 29 дек. 2012
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

Дополнительная информация

Статус:

Low
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=891142GnuPG: read_block() corrupt key input validation

EPSS

Процентиль: 85%
0.02443
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

nvd
больше 12 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

debian
больше 12 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 a ...

github
больше 3 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

oracle-oval
почти 12 лет назад

ELSA-2013-1459: gnupg2 security update (MODERATE)

EPSS

Процентиль: 85%
0.02443
Низкий

4.3 Medium

CVSS2