CVE-2010-2547
2: use-after-free when importing certificate with many alternate names
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.
Vulnerabilidad de uso después de la liberación (use-after-free) en kbx/keybox-blob.c en GPGSM de GnuPG v2.x hasta v2.0.16 permite a atacantes remotos causar una denegación de servicio (caída del sistema) y posiblemente ejecutar código de su elección mediante un certificado con un gran número de Subject Alternate Names, que no es manejado de forma adecuada en una operación realloc cuando se importa el certificado o se verifica su firma.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-06-30 CVE Reserved
- 2010-07-28 CVE Published
- 2024-02-03 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-416: Use After Free
CAPEC
References (20)
URL | Tag | Source |
---|---|---|
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0076 | Broken Link | |
http://www.securityfocus.com/bid/41945 | Broken Link | |
http://www.securitytracker.com/id?1024247 | Broken Link | |
http://www.vupen.com/english/advisories/2010/2217 | Broken Link | |
http://www.vupen.com/english/advisories/2010/3125 | Broken Link | |
https://issues.rpath.com/browse/RPL-3229 | Broken Link |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.gnupg.org/pipermail/gnupg-announce/2010q3/000302.html | 2024-02-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnupg Search vendor "Gnupg" | Gnupg Search vendor "Gnupg" for product "Gnupg" | >= 2.0.0 <= 2.0.16 Search vendor "Gnupg" for product "Gnupg" and version " >= 2.0.0 <= 2.0.16" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 13 Search vendor "Fedoraproject" for product "Fedora" and version "13" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
|