// For flags

CVE-2006-3082

GnuPG 1.4.3/1.9.x - Parse_User_ID Remote Buffer Overflow

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.

parse-packet.c en GnuPG (gpg) v1.4.3, v1.9.20 y versiones anteriores, permite a atacantes remotos provocar una denegación de servicio (caída de gpg) y posiblemente sobrescribir la memoria a través de un paquete de mensajes de gran longitud (con un ID de usuario demasiado largo), lo cual podría llevar a un desbordamiento de enteros, tal y como se demuestra con la opción '-no-armor'.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-06-19 CVE Reserved
  • 2006-06-19 CVE Published
  • 2006-06-20 First Exploit
  • 2024-05-09 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-189: Numeric Errors
CAPEC
References (36)
URL Date SRC
URL Date SRC
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U 2018-10-18
http://secunia.com/advisories/20783 2018-10-18
http://secunia.com/advisories/20801 2018-10-18
http://secunia.com/advisories/20811 2018-10-18
http://secunia.com/advisories/20829 2018-10-18
http://secunia.com/advisories/20881 2018-10-18
http://secunia.com/advisories/20899 2018-10-18
http://secunia.com/advisories/20968 2018-10-18
http://secunia.com/advisories/21063 2018-10-18
http://secunia.com/advisories/21135 2018-10-18
http://secunia.com/advisories/21137 2018-10-18
http://secunia.com/advisories/21143 2018-10-18
http://secunia.com/advisories/21585 2018-10-18
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.457382 2018-10-18
http://www.debian.org/security/2006/dsa-1107 2018-10-18
http://www.debian.org/security/2006/dsa-1115 2018-10-18
http://www.mandriva.com/security/advisories?name=MDKSA-2006:110 2018-10-18
http://www.novell.com/linux/security/advisories/2006_18_sr.html 2018-10-18
http://www.novell.com/linux/security/advisories/2006_38_security.html 2018-10-18
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.010.html 2018-10-18
http://www.redhat.com/support/errata/RHSA-2006-0571.html 2018-10-18
http://www.securityfocus.com/bid/18554 2018-10-18
http://www.vupen.com/english/advisories/2006/2450 2018-10-18
https://usn.ubuntu.com/304-1 2018-10-18
https://access.redhat.com/security/cve/CVE-2006-3082 2006-07-18
https://bugzilla.redhat.com/show_bug.cgi?id=1618133 2006-07-18
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gnupg
Search vendor "Gnupg"
Gnupg
Search vendor "Gnupg" for product "Gnupg"
<= 1.9.20
Search vendor "Gnupg" for product "Gnupg" and version " <= 1.9.20"
-
Affected
Gnupg
Search vendor "Gnupg"
Gnupg
Search vendor "Gnupg" for product "Gnupg"
1.4.3
Search vendor "Gnupg" for product "Gnupg" and version "1.4.3"
-
Affected