First published: Mon Dec 01 2014(Updated: )
Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mageia Mageia | =3.0 | |
Mageia Mageia | =4.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Gnupg Libksba | <1.3.2 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 | |
Gnupg Gnupg | =2.1.0 | |
Gnupg Gnupg | =2.1.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.