parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the –no-armor option.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gnupg | Gnupg | * | 1.9.20 (including) |
Gnupg | Gnupg | 1.4.3 (including) | 1.4.3 (including) |
Red Hat Enterprise Linux 3 | RedHat | gnupg-0:1.2.1-16 | * |
Red Hat Enterprise Linux 4 | RedHat | gnupg-0:1.2.6-5 | * |
Gnupg | Ubuntu | dapper | * |
Gnupg | Ubuntu | devel | * |
Gnupg | Ubuntu | edgy | * |
Gnupg | Ubuntu | feisty | * |
Gnupg | Ubuntu | gutsy | * |
Gnupg | Ubuntu | hardy | * |
Gnupg | Ubuntu | intrepid | * |
Gnupg | Ubuntu | jaunty | * |
Gnupg | Ubuntu | karmic | * |
Gnupg2 | Ubuntu | dapper | * |
Gnupg2 | Ubuntu | devel | * |
Gnupg2 | Ubuntu | edgy | * |
Gnupg2 | Ubuntu | feisty | * |
Gnupg2 | Ubuntu | gutsy | * |
Gnupg2 | Ubuntu | hardy | * |
Gnupg2 | Ubuntu | intrepid | * |
Gnupg2 | Ubuntu | jaunty | * |
Gnupg2 | Ubuntu | karmic | * |