Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-1606

Опубликовано: 13 фев. 2015
Источник: redhat
CVSS2: 1.2

Описание

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

Отчет

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5gnupgWill not fix
Red Hat Enterprise Linux 5gnupg2Will not fix
Red Hat Enterprise Linux 6gnupg2Will not fix
Red Hat Enterprise Linux 7gnupg2Will not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1193008gnupg2: invalid memory read using a garbled keyring

1.2 Low

CVSS2

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 6 лет назад

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

CVSS3: 5.5
nvd
около 6 лет назад

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

CVSS3: 5.5
debian
около 6 лет назад

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid ...

CVSS3: 5.5
github
больше 3 лет назад

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

suse-cvrf
около 10 лет назад

Security update for gpg2

1.2 Low

CVSS2