Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-6235

Опубликовано: 07 дек. 2006
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 10

Описание

A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.

РелизСтатусПримечание
dapper

released

1.4.2.2-1ubuntu2.5
devel

released

1.4.6-1ubuntu2
edgy

released

1.4.3-2ubuntu3.3
feisty

released

1.4.6-1ubuntu2
gutsy

released

1.4.6-1ubuntu2
hardy

released

1.4.6-1ubuntu2
intrepid

released

1.4.6-1ubuntu2
jaunty

released

1.4.6-1ubuntu2
karmic

released

1.4.6-1ubuntu2
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

released

2.0.3-1ubuntu1
edgy

released

1.9.21-0ubuntu5.3
feisty

released

2.0.3-1ubuntu1
gutsy

released

2.0.3-1ubuntu1
hardy

released

2.0.3-1ubuntu1
intrepid

released

2.0.3-1ubuntu1
jaunty

released

2.0.3-1ubuntu1
karmic

released

2.0.3-1ubuntu1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 92%
0.08898
Низкий

10 Critical

CVSS2

Связанные уязвимости

redhat
почти 19 лет назад

A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.

nvd
почти 19 лет назад

A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.

debian
почти 19 лет назад

A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x ...

github
больше 3 лет назад

A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.

fstec
почти 11 лет назад

Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 92%
0.08898
Низкий

10 Critical

CVSS2