First published: Tue Dec 31 2002(Updated: )
Buffer overflow in PGPFreeware 7.03 running on Windows NT 4.0 SP6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly including (1) a large Security Parameter Index (SPI) field, (2) large number of payloads, or (3) a long payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
network associates PGP Freeware | =7.03 | |
PGP Freeware | =7.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2224 has a severity rating indicating it can lead to a denial of service and possible arbitrary code execution.
To fix CVE-2002-2224, upgrade from PGP Freeware 7.03 to a patched version that addresses this vulnerability.
CVE-2002-2224 affects the PGP Freeware 7.03 when running on Windows NT 4.0 SP6.
CVE-2002-2224 can be exploited through crafted Internet Key Exchange (IKE) response packets.
Yes, CVE-2002-2224 may allow remote attackers to execute arbitrary code due to the buffer overflow.