Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-1606

Опубликовано: 20 нояб. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.5

Описание

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

РелизСтатусПримечание
devel

not-affected

1.4.18-7ubuntu1
esm-infra-legacy/trusty

released

1.4.16-1ubuntu2.3
lucid

released

1.4.10-2ubuntu1.8
precise

released

1.4.11-3ubuntu2.9
trusty

released

1.4.16-1ubuntu2.3
trusty/esm

released

1.4.16-1ubuntu2.3
upstream

released

1.4.18-7
utopic

released

1.4.16-1.2ubuntu1.2

Показывать по

РелизСтатусПримечание
devel

released

2.0.26-6ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [2.0.22-3ubuntu1.3]]
lucid

ignored

end of life
precise

released

2.0.17-2ubuntu2.12.04.6
trusty

released

2.0.22-3ubuntu1.3
trusty/esm

DNE

trusty was released [2.0.22-3ubuntu1.3]
upstream

released

2.0.27,2.0.26-5
utopic

released

2.0.24-1ubuntu2.2

Показывать по

EPSS

Процентиль: 64%
0.00474
Низкий

4.3 Medium

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

redhat
почти 11 лет назад

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

CVSS3: 5.5
nvd
около 6 лет назад

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

CVSS3: 5.5
debian
около 6 лет назад

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid ...

CVSS3: 5.5
github
больше 3 лет назад

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

suse-cvrf
около 10 лет назад

Security update for gpg2

EPSS

Процентиль: 64%
0.00474
Низкий

4.3 Medium

CVSS2

5.5 Medium

CVSS3