A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2006-12-07 03:28
Updated : 2018-10-17 14:47
NVD link : CVE-2006-6235
Mitre link : CVE-2006-6235
JSON object : View
CWE
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux
- fedora_core
- linux_advanced_workstation
slackware
- slackware_linux
gnu
- privacy_guard
ubuntu
- ubuntu_linux
gpg4win
- gpg4win
rpath
- linux