Description
A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1231-1 | New gnupg packages fix arbitrary code execution |
EUVD |
EUVD-2006-6218 | A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory. |
Ubuntu USN |
USN-393-1 | GnuPG vulnerability |
Ubuntu USN |
USN-393-2 | GnuPG2 vulnerabilities |
References
History
No history.
Subscriptions
Gnu
Subscribe
Privacy Guard
Subscribe
Gpg4win
Subscribe
Gpg4win
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Fedora Core
Subscribe
Linux Advanced Workstation
Subscribe
Rpath
Subscribe
Linux
Subscribe
Slackware
Subscribe
Slackware Linux
Subscribe
Ubuntu
Subscribe
Ubuntu Linux
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T20:19:35.196Z
Reserved: 2006-12-02T00:00:00.000Z
Link: CVE-2006-6235
No data.
Status : Deferred
Published: 2006-12-07T11:28:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2006-6235
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN