CVE-2006-3082
Published: 19 June 2006
parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.
Priority
Status
Package | Release | Status |
---|---|---|
gnupg Launchpad, Ubuntu, Debian |
dapper |
Released
(1.4.2.2-1ubuntu2.5)
|
edgy |
Released
(1.4.3-2ubuntu3.3)
|
|
feisty |
Released
(1.4.6-1ubuntu2)
|
|
gutsy |
Released
(1.4.6-1ubuntu2)
|
|
hardy |
Released
(1.4.6-1ubuntu2)
|
|
intrepid |
Released
(1.4.6-1ubuntu2)
|
|
jaunty |
Released
(1.4.6-1ubuntu2)
|
|
karmic |
Released
(1.4.6-1ubuntu2)
|
|
upstream |
Needs triage
|
|
gnupg2 Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
edgy |
Released
(1.9.21-0ubuntu5.3)
|
|
feisty |
Released
(2.0.3-1ubuntu1)
|
|
gutsy |
Released
(2.0.3-1ubuntu1)
|
|
hardy |
Released
(2.0.3-1ubuntu1)
|
|
intrepid |
Released
(2.0.3-1ubuntu1)
|
|
jaunty |
Released
(2.0.3-1ubuntu1)
|
|
karmic |
Released
(2.0.3-1ubuntu1)
|
|
upstream |
Needs triage
|