Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-6085

Опубликовано: 24 янв. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.8

Описание

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

РелизСтатусПримечание
devel

not-affected

1.4.12-7ubuntu1
hardy

released

1.4.6-2ubuntu5.2
lucid

released

1.4.10-2ubuntu1.2
oneiric

released

1.4.11-3ubuntu1.11.10.2
precise

released

1.4.11-3ubuntu2.2
quantal

released

1.4.11-3ubuntu4.1
upstream

released

1.4.13,1.4.12-7

Показывать по

РелизСтатусПримечание
devel

released

2.0.19-2ubuntu1
hardy

ignored

end of life
lucid

released

2.0.14-1ubuntu1.5
oneiric

released

2.0.17-2ubuntu2.11.10.2
precise

released

2.0.17-2ubuntu2.12.04.2
quantal

released

2.0.17-2ubuntu3.1
upstream

released

2.0.19-2

Показывать по

EPSS

Процентиль: 85%
0.02443
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

nvd
больше 12 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

debian
больше 12 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 a ...

github
больше 3 лет назад

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.

oracle-oval
почти 12 лет назад

ELSA-2013-1459: gnupg2 security update (MODERATE)

EPSS

Процентиль: 85%
0.02443
Низкий

5.8 Medium

CVSS2