gnupg vulnerability

Related Vulnerabilities: CVE-2006-3746  

Evgeny Legerov discovered that gnupg did not sufficiently check the validity of the comment and a control field. Specially crafted GPG data could cause a buffer overflow. This could be exploited to execute arbitrary code with the user’s privileges if an attacker can trick an user into processing a malicious encrypted/signed document with gnupg.

The problem can be corrected by updating your system to the following package versions:

3 August 2006

gnupg vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 6.06 LTS
  • Ubuntu 5.10
  • Ubuntu 5.04

Software Description

Details

Evgeny Legerov discovered that gnupg did not sufficiently check the validity of the comment and a control field. Specially crafted GPG data could cause a buffer overflow. This could be exploited to execute arbitrary code with the user’s privileges if an attacker can trick an user into processing a malicious encrypted/signed document with gnupg.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.06 LTS
gnupg - 1.4.2.2-1ubuntu2.2
Ubuntu 5.10
gnupg - 1.4.1-1ubuntu1.4
Ubuntu 5.04
gnupg - 1.2.5-3ubuntu5.5

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the necessary changes.

References