vendor:
PGP Public Key Server
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: PGP Public Key Server
Affected Version From: PGP Public Key Server
Affected Version To: PGP Public Key Server
Patch Exists: No
Related CWE: CVE-2002-0991
CPE: a:pgp:pgp_public_key_server
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Unix
2002
PGP Public Key Server Buffer Overflow Vulnerability
The PGP Public Key Server does not properly handle long search strings. Under some conditions, it may be possible to pass a long string to the server that could result in a buffer overflow. This may result in the overwriting of stack variables, including the return address. It should be noted that this vulnerability would be difficult to exploit, as client data is passed through isalnum() and tolower().
Mitigation:
No known mitigation