7.8
CVSSv3

CVE-2020-25125

Published: 03/09/2020 Updated: 11/09/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnupg gnupg 2.2.22

gpg4win gpg4win 3.1.12

gnupg gnupg 2.2.21

Vendor Advisories

Importing an OpenPGP key having a preference list for AEAD algorithms will lead to an array overflow and thus often to a crash or other undefined behaviour Importing an arbitrary key can often easily be triggered by an attacker and thus triggering this bug Exploiting the bug aside from crashes is not trivial but likely possible for a dedicated ...

Mailing Lists

CVE-2020-25125 was assigned to the following issue in GnuPG: listsgnupgorg/pipermail/gnupg-announce/2020q3/000448html -- Wolfgang Frisch <wolfgangfrisch () suse com> Security Engineer OpenPGP fingerprint: A2E6 B7D4 53E9 544F BC13 D26B D9B3 56BD 4D4A 2D15 SUSE Software Solutions Germany GmbH Maxfeldstr 5, 90409 Nuremberg, ...
Hi, gnupg just released a security fix update CVE-2020-25125 listsgnupgorg/pipermail/gnupg-announce/2020q3/000448html Importing an OpenPGP key having a preference list for AEAD algorithms will lead to an array overflow and thus often to a crash or other undefined behaviour Importing an arbitrary key can often easily be trigger ...