First published: Mon Jun 19 2006(Updated: )
parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GnuPG 2 (Gnu Privacy Guard) | =1.4.3 | |
GnuPG 2 (Gnu Privacy Guard) | <=1.9.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3082 is considered a medium severity vulnerability due to its potential for causing denial of service and memory corruption.
To mitigate CVE-2006-3082, upgrade GnuPG to version 1.4.4 or later, or 1.9.21 or later.
CVE-2006-3082 affects GnuPG versions 1.4.3 and earlier, as well as all versions up to and including 1.9.20.
An attacker can exploit CVE-2006-3082 to crash GnuPG or potentially execute arbitrary code through a specially crafted message packet.
A temporary workaround for CVE-2006-3082 is to avoid processing messages with long user ID strings until the software is updated.