parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the –no-armor option.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Gnupg | Gnupg | * | 1.9.20 (including) |
| Gnupg | Gnupg | 1.4.3 (including) | 1.4.3 (including) |
| Red Hat Enterprise Linux 3 | RedHat | gnupg-0:1.2.1-16 | * |
| Red Hat Enterprise Linux 4 | RedHat | gnupg-0:1.2.6-5 | * |
| Gnupg | Ubuntu | dapper | * |
| Gnupg | Ubuntu | devel | * |
| Gnupg | Ubuntu | edgy | * |
| Gnupg | Ubuntu | feisty | * |
| Gnupg | Ubuntu | gutsy | * |
| Gnupg | Ubuntu | hardy | * |
| Gnupg | Ubuntu | intrepid | * |
| Gnupg | Ubuntu | jaunty | * |
| Gnupg | Ubuntu | karmic | * |
| Gnupg2 | Ubuntu | dapper | * |
| Gnupg2 | Ubuntu | devel | * |
| Gnupg2 | Ubuntu | edgy | * |
| Gnupg2 | Ubuntu | feisty | * |
| Gnupg2 | Ubuntu | gutsy | * |
| Gnupg2 | Ubuntu | hardy | * |
| Gnupg2 | Ubuntu | intrepid | * |
| Gnupg2 | Ubuntu | jaunty | * |
| Gnupg2 | Ubuntu | karmic | * |