7.5
CVSSv2

CVE-2014-9087

Published: 01/12/2014 Updated: 18/05/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer underflow in the ksba_oid_to_str function in Libksba prior to 1.3.2, as used in GnuPG, allows remote malicious users to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mageia mageia 3.0

mageia mageia 4.0

debian debian linux 8.0

debian debian linux 7.0

gnupg libksba

canonical ubuntu linux 14.10

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

gnupg gnupg 2.1.0

Vendor Advisories

Debian Bug report logs - #770972 libksba: CVE-2014-9087: buffer overflow in ksba_oid_to_str Package: src:libksba; Maintainer for src:libksba is Debian GnuTLS Maintainers <pkg-gnutls-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 25 Nov 2014 15:18:13 UTC Severity: grav ...
Libksba could be made to crash or run programs if it opened a specially crafted file ...
An integer underflow flaw, leading to a heap-based buffer overflow, was found in the ksba_oid_to_str() function of libksba, an X509 and CMS (PKCS#7) library By using special crafted S/MIME messages or ECC based OpenPGP data, it is possible to create a buffer overflow, which could cause an application using libksba to crash (denial of service), or ...