A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1231-1 | New gnupg packages fix arbitrary code execution |
EUVD |
EUVD-2006-6218 | A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory. |
Ubuntu USN |
USN-393-1 | GnuPG vulnerability |
Ubuntu USN |
USN-393-2 | GnuPG2 vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T20:19:35.196Z
Reserved: 2006-12-02T00:00:00
Link: CVE-2006-6235
No data.
Status : Deferred
Published: 2006-12-07T11:28:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2006-6235
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN