First published: Thu Sep 03 2020(Updated: )
GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnupg Gnupg | =2.2.21 | |
Gnupg Gnupg | =2.2.22 | |
Gpg4win Gpg4win | =3.1.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-25125.
The severity of CVE-2020-25125 is high, with a CVSS score of 7.8.
The affected software versions are GnuPG 2.2.21, GnuPG 2.2.22, and Gpg4win 3.1.12.
The impact of CVE-2020-25125 can lead to a crash or possibly unspecified other impact.
There is no known fix or patch available for CVE-2020-25125 at the moment. It is recommended to follow the provided references for any updates or mitigation strategies.