Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-2547

Опубликовано: 05 авг. 2010
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5.1
CVSS3: 8.1

Описание

Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.

РелизСтатусПримечание
dapper

ignored

end of life
devel

released

2.0.14-1.1ubuntu2
hardy

released

2.0.7-1ubuntu0.1
jaunty

released

2.0.9-3.1ubuntu0.1
karmic

released

2.0.12-0ubuntu2.1
lucid

released

2.0.14-1ubuntu1.2
upstream

released

2.0.17

Показывать по

EPSS

Процентиль: 94%
0.15103
Средний

5.1 Medium

CVSS2

8.1 High

CVSS3

Связанные уязвимости

redhat
почти 15 лет назад

Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.

CVSS3: 8.1
nvd
почти 15 лет назад

Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.

CVSS3: 8.1
debian
почти 15 лет назад

Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2. ...

CVSS3: 8.1
github
около 3 лет назад

Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.

oracle-oval
почти 15 лет назад

ELSA-2010-0603: gnupg2 security update (MODERATE)

EPSS

Процентиль: 94%
0.15103
Средний

5.1 Medium

CVSS2

8.1 High

CVSS3