CVE Vulnerabilities

CVE-2015-1606

Use After Free

Published: Nov 20, 2019 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
1.2 LOW
AV:L/AC:H/Au:N/C:P/I:N/A:N
RedHat/V3
Ubuntu
LOW

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

Name Vendor Start Version End Version
Gnupg Gnupg * 2.1.2 (excluding)
Gnupg Ubuntu esm-infra-legacy/trusty *
Gnupg Ubuntu lucid *
Gnupg Ubuntu precise *
Gnupg Ubuntu trusty *
Gnupg Ubuntu trusty/esm *
Gnupg Ubuntu upstream *
Gnupg Ubuntu utopic *
Gnupg2 Ubuntu devel *
Gnupg2 Ubuntu lucid *
Gnupg2 Ubuntu precise *
Gnupg2 Ubuntu trusty *
Gnupg2 Ubuntu upstream *
Gnupg2 Ubuntu utopic *

Potential Mitigations

References