First published: Thu Dec 07 2006(Updated: )
A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnu Privacy Guard | =1.2.4 | |
Gnu Privacy Guard | =1.2.5 | |
Gnu Privacy Guard | =1.2.6 | |
Gnu Privacy Guard | =1.2.7 | |
Gnu Privacy Guard | =1.3.3 | |
Gnu Privacy Guard | =1.3.4 | |
Gnu Privacy Guard | =1.4 | |
Gnu Privacy Guard | =1.4.1 | |
Gnu Privacy Guard | =1.4.2 | |
Gnu Privacy Guard | =1.4.2.1 | |
Gnu Privacy Guard | =1.4.2.2 | |
Gnu Privacy Guard | =1.4.3 | |
Gnu Privacy Guard | =1.4.4 | |
Gnu Privacy Guard | =1.4.5 | |
Gnu Privacy Guard | =1.9.10 | |
Gnu Privacy Guard | =1.9.15 | |
Gnu Privacy Guard | =1.9.20 | |
Gnu Privacy Guard | =2.0 | |
Gnu Privacy Guard | =2.0.1 | |
Gpg4win Gpg4win | =1.0.7 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Redhat Enterprise Linux Desktop | =3.0 | |
Redhat Enterprise Linux Desktop | =4.0 | |
Redhat Fedora Core | =core_5.0 | |
Redhat Fedora Core | =core6 | |
Redhat Linux Advanced Workstation | =2.1 | |
Rpath Linux | =1 | |
Slackware Slackware Linux | =11.0 | |
Ubuntu Ubuntu Linux | =5.10 | |
Ubuntu Ubuntu Linux | =6.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.