First published: Fri Oct 04 2013(Updated: )
The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnupg | <1.4.15 | 1.4.15 |
redhat/gnupg | <2.0.22 | 2.0.22 |
Debian GnuPG | =1.4.0 | |
Debian GnuPG | =1.4.2 | |
Debian GnuPG | =1.4.3 | |
Debian GnuPG | =1.4.4 | |
Debian GnuPG | =1.4.5 | |
Debian GnuPG | =1.4.8 | |
Debian GnuPG | =1.4.10 | |
Debian GnuPG | =1.4.11 | |
Debian GnuPG | =1.4.12 | |
Debian GnuPG | =1.4.13 | |
Debian GnuPG | =1.4.14 | |
Debian GnuPG | =2.0 | |
Debian GnuPG | =2.0.1 | |
Debian GnuPG | =2.0.10 | |
Debian GnuPG | =2.0.11 | |
Debian GnuPG | =2.0.12 | |
Debian GnuPG | =2.0.13 | |
Debian GnuPG | =2.0.14 | |
Debian GnuPG | =2.0.15 | |
Debian GnuPG | =2.0.16 | |
Debian GnuPG | =2.0.17 | |
Debian GnuPG | =2.0.18 | |
Debian GnuPG | =2.0.19 | |
Debian GnuPG | =2.0.20 | |
Debian GnuPG | =2.0.21 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4402 is classified as a denial of service vulnerability due to infinite recursion in the GnuPG compressed packet parser.
To fix CVE-2013-4402, upgrade GnuPG to version 1.4.15 or later for the 1.4.x series or to version 2.0.22 or later for the 2.0.x series.
GnuPG versions 1.4.0 to 1.4.14 and 2.0.0 to 2.0.21 are affected by CVE-2013-4402.
CVE-2013-4402 primarily causes denial of service, but unexpected behavior in crypto implementations may pose a risk of data loss.
If you are using GnuPG versions prior to 1.4.15 or 2.0.22, your system is vulnerable to CVE-2013-4402.