header-logo
Suggest Exploit
vendor:
GnuPG
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer-Overflow
120
CWE
Product Name: GnuPG
Affected Version From: 1.4.2004
Affected Version To: 1.4.2004
Patch Exists: YES
Related CWE: N/A
CPE: 2.3:a:gnupg:gnupg:1.4.4
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2006

GnuPG Remote Buffer-Overflow Vulnerability

GnuPG is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. This issue may allow remote attackers to execute arbitrary machine code in the context of the affected application, but this has not been confirmed.

Mitigation:

Upgrade to the latest version of GnuPG
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/19110/info

GnuPG is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

This issue may allow remote attackers to execute arbitrary machine code in the context of the affected application, but this has not been confirmed.

GnuPG version 1.4.4 is vulnerable to this issue; previous versions may also be affected.

perl -e 'print "\xfd\xff\xff\xff\xff\xfe"'| /var/gnupg/bin/gpg --no-armor