Page 3 of 21 results (0.002 seconds)

CVSS: 7.5EPSS: 23%CPEs: 2EXPL: 1

19 Jun 2006 — parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option. parse-packet.c en GnuPG (gpg) v1.4.3, v1.9.20 y versiones anteriores, permite a atacantes remotos provocar una denegación de servicio (caída de gpg) y posiblemente sobrescribir la memoria a través ... • https://www.exploit-db.com/exploits/28077 • CWE-189: Numeric Errors •