A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1231-1 | New gnupg packages fix arbitrary code execution |
![]() |
EUVD-2006-6218 | A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory. |
![]() |
USN-393-1 | GnuPG vulnerability |
![]() |
USN-393-2 | GnuPG2 vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T20:19:35.196Z
Reserved: 2006-12-02T00:00:00
Link: CVE-2006-6235

No data.

Status : Deferred
Published: 2006-12-07T11:28:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2006-6235


No data.