5.1
CVSSv2

CVE-2010-2547

Published: 05/08/2010 Updated: 02/02/2024
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x up to and including 2.0.16 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.

Vulnerable Product Search on Vulmon Subscribe to Product

gnupg gnupg

fedoraproject fedora 13

debian debian linux 5.0

Vendor Advisories

Synopsis Moderate: gnupg2 security update Type/Severity Security Advisory: Moderate Topic An updated gnupg2 package that fixes one security issue is now availablefor Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact A Common Vulnerability ...
It was discovered that GPGSM in GnuPG2 did not correctly handle certificates with a large number of Subject Alternate Names If a user or automated system were tricked into processing a specially crafted certificate, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program ...