Page 3 of 24 results (0.005 seconds)

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 0

29 Nov 2006 — Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt. Desbordamiento de búfer basado en montículo en la función ask_outfile_name en el openfile.c para GnuPG (gpg) 1.4 y 2.0, cuando se está ejecutando interactivamente, podría permi... • ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc •

CVSS: 9.8EPSS: 32%CPEs: 1EXPL: 4

28 Jul 2006 — Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message. Desbordamiento de búfer de enteros en parse_comment en GnuPG (gpg) 1.4.4 permite a atacantes remotos provocar denegación de servicio (fallo de segmentación) a través de un mensaje manipulado. • https://www.exploit-db.com/exploits/28257 •

CVSS: 7.5EPSS: 22%CPEs: 2EXPL: 1

19 Jun 2006 — parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option. parse-packet.c en GnuPG (gpg) v1.4.3, v1.9.20 y versiones anteriores, permite a atacantes remotos provocar una denegación de servicio (caída de gpg) y posiblemente sobrescribir la memoria a través ... • https://www.exploit-db.com/exploits/28077 • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 7%CPEs: 1EXPL: 0

11 Feb 2005 — The integrity check feature in OpenPGP, when handling a message that was encrypted using cipher feedback (CFB) mode, allows remote attackers to recover part of the plaintext via a chosen-ciphertext attack when the first 2 bytes of a message block are known, and an oracle or other mechanism is available to determine whether an integrity check failed. • http://eprint.iacr.org/2005/033 • CWE-326: Inadequate Encryption Strength •