source: http://www.securityfocus.com/bid/2797/info
GnuPG is a popular open source public/private key encryption system.
It is possible for attackers to create an encrypted document that will exploit a format string vulnerability in the GnuPG client when the document is decrypted.
This vulnerability may lead to remote attackers gaining access to client hosts.
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20889.tar.gz