parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and previous versions versions, allows remote malicious users to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnupg gnupg 1.4.3 |
||
gnupg gnupg |