First published: Wed Nov 20 2019(Updated: )
kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extensions and "memcpy with overlapping ranges."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnupg Gnupg | <1.4.19 | |
Gnupg Gnupg | >=2.0<2.0.27 | |
Gnupg Gnupg | >=2.1.0<2.1.2 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-1607 is medium with a severity value of 5.5.
GnuPG versions before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 are affected. Additionally, Ubuntu Linux versions 10.04, 12.04, 14.04, and 14.10 are also affected.
CVE-2015-1607 allows remote attackers to cause a denial of service (invalid read operation) through a crafted keyring file, due to improper handling of bitwise left-shifts.
Yes, updating to GnuPG 1.4.19, 2.0.27, or 2.1.2 will fix the vulnerability.
More information about CVE-2015-1607 can be found on the following references: [Link 1](http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2183683bd633818dd031b090b5530951de76f392), [Link 2](http://www.openwall.com/lists/oss-security/2015/02/13/14), [Link 3](http://www.openwall.com/lists/oss-security/2015/02/14/6).