Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow malicious users to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnupg gnupg 1.4 |
||
gnupg gnupg 2.0 |