First published: Thu Dec 07 2006(Updated: )
A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GnuPG | =2.0.1 | |
GnuPG | =1.4.2 | |
GnuPG | =1.4 | |
GnuPG | =1.4.5 | |
GnuPG | =1.4.1 | |
RealFlex RealWin | =1.0.7 | |
GnuPG | =1.9.20 | |
GnuPG | =2.0 | |
GnuPG | =1.3.3 | |
GnuPG | =1.4.2.1 | |
GnuPG | =1.4.3 | |
GnuPG | =1.2.6 | |
GnuPG | =1.2.5 | |
GnuPG | =1.3.4 | |
GnuPG | =1.9.15 | |
GnuPG | =1.9.10 | |
GnuPG | =1.4.4 | |
GnuPG | =1.4.2.2 | |
GnuPG | =1.2.7 | |
GnuPG | =1.2.4 | |
Ubuntu | =5.10 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux Desktop | =3.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Fedora Core | =core_5.0 | |
rPath Appliance Platform | =1 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Red Hat Fedora Core | =core6 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux Desktop | =4.0 | |
Ubuntu | =6.06 | |
Slackware Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6235 has been classified as a critical vulnerability due to its potential to allow remote code execution.
To remediate CVE-2006-6235, upgrade GnuPG to version 1.4.6 or later, or 2.0.2 or later.
CVE-2006-6235 affects multiple versions of GnuPG including 1.x before 1.4.6 and 2.x before 2.0.2.
CVE-2006-6235 can be exploited through specially crafted OpenPGP packets that trigger a stack overwrite.
While CVE-2006-6235 is an older vulnerability, it remains a concern for systems that have not been updated.