First published: Mon Dec 01 2014(Updated: )
Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mageia | =3.0 | |
Mageia | =4.0 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
CentOS Libksba | <1.3.2 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
GnuPG 2 (Gnu Privacy Guard) | =2.1.0 | |
GnuPG 2 (Gnu Privacy Guard) | =2.1.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9087 has a medium severity level due to its potential to cause a denial of service.
To fix CVE-2014-9087, you should upgrade Libksba to version 1.3.2 or later.
CVE-2014-9087 affects Libksba versions prior to 1.3.2, as well as various distributions like Debian and Ubuntu.
CVE-2014-9087 enables remote attackers to crash systems via crafted S/MIME messages or ECC-based OpenPGP data.
CVE-2014-9087 remains a risk for systems not updated to the patched version of Libksba.