Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gnupg | Gnupg | 1.4.4 (including) | 1.4.4 (including) |
Red Hat Enterprise Linux 3 | RedHat | gnupg-0:1.2.1-17 | * |
Red Hat Enterprise Linux 4 | RedHat | gnupg-0:1.2.6-6 | * |
Gnupg | Ubuntu | dapper | * |
Gnupg | Ubuntu | devel | * |
Gnupg | Ubuntu | edgy | * |
Gnupg | Ubuntu | feisty | * |
Gnupg | Ubuntu | gutsy | * |
Gnupg | Ubuntu | hardy | * |
Gnupg | Ubuntu | intrepid | * |
Gnupg | Ubuntu | jaunty | * |
Gnupg | Ubuntu | karmic | * |
Gnupg2 | Ubuntu | dapper | * |
Gnupg2 | Ubuntu | devel | * |
Gnupg2 | Ubuntu | edgy | * |
Gnupg2 | Ubuntu | feisty | * |
Gnupg2 | Ubuntu | gutsy | * |
Gnupg2 | Ubuntu | hardy | * |
Gnupg2 | Ubuntu | intrepid | * |
Gnupg2 | Ubuntu | jaunty | * |
Gnupg2 | Ubuntu | karmic | * |