A "stack overwrite" vulnerability in GnuPG (gpg) 1.x prior to 1.4.6, 2.x prior to 2.0.2, and 1.9.0 up to and including 1.9.95 allows malicious users to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnu privacy guard 2.0.1 |
||
gnu privacy guard 1.4.2 |
||
gnu privacy guard 1.4 |
||
gnu privacy guard 1.4.5 |
||
gnu privacy guard 1.4.1 |
||
gpg4win gpg4win 1.0.7 |
||
gnu privacy guard 1.9.20 |
||
gnu privacy guard 2.0 |
||
gnu privacy guard 1.3.3 |
||
gnu privacy guard 1.4.2.1 |
||
gnu privacy guard 1.4.3 |
||
gnu privacy guard 1.2.6 |
||
gnu privacy guard 1.2.5 |
||
gnu privacy guard 1.3.4 |
||
gnu privacy guard 1.9.15 |
||
gnu privacy guard 1.9.10 |
||
gnu privacy guard 1.4.4 |
||
gnu privacy guard 1.4.2.2 |
||
gnu privacy guard 1.2.7 |
||
gnu privacy guard 1.2.4 |
||
ubuntu ubuntu linux 5.10 |
||
redhat enterprise linux 4.0 |
||
redhat enterprise linux desktop 3.0 |
||
redhat fedora core core 5.0 |
||
rpath linux 1 |
||
redhat linux advanced workstation 2.1 |
||
redhat fedora core core6 |
||
redhat enterprise linux desktop 4.0 |
||
ubuntu ubuntu linux 6.06 |
||
slackware slackware linux 11.0 |