Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-9087

Опубликовано: 25 нояб. 2014
Источник: redhat
CVSS2: 5.1
EPSS Низкий

Описание

Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5libksbaWill not fix
Red Hat Enterprise Linux 6libksbaWill not fix
Red Hat Enterprise Linux 7libksbaWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190->CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1168051libksba: integer underflow flaw leading to a heap-based buffer overflow in ksba_oid_to_str()

EPSS

Процентиль: 91%
0.06155
Низкий

5.1 Medium

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.

nvd
около 11 лет назад

Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.

debian
около 11 лет назад

Integer underflow in the ksba_oid_to_str function in Libksba before 1. ...

github
больше 3 лет назад

Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.

EPSS

Процентиль: 91%
0.06155
Низкий

5.1 Medium

CVSS2