CVE-2006-6235Privacy Guard vulnerability

11 documents8 sources
Severity
10.0CRITICALNVD
EPSS
8.9%
top 7.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 7
Latest updateMay 3

Description

A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages7 packages

NVDgpg4win/gpg4win1.0.7
NVDgnu/privacy_guard19 versions+18
NVDredhat/fedora_corecore6, core_5.0+1

Also affects: Ubuntu Linux 5.10, 6.06, Enterprise Linux 4.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-fxx3-6m2r-fwh5: A "stack overwrite" vulnerability in GnuPG (gpg) 12022-05-03
OSV
CVE-2006-6235: A "stack overwrite" vulnerability in GnuPG (gpg) 12006-12-07
CVEList
CVE-2006-6235: A "stack overwrite" vulnerability in GnuPG (gpg) 12006-12-07

📋Vendor Advisories

4
Ubuntu
GnuPG vulnerability2006-12-07
Ubuntu
GnuPG2 vulnerabilities2006-12-07
Red Hat
security flaw2006-12-06
Debian
CVE-2006-6235: gnupg2 - A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2....2006

💬Community

3
Bugzilla
CVE-2006-6235 security flaw2018-08-16
Bugzilla
CVE-2006-6235: gnupg2 <= 2.0.1 stack overwrite vulnerability2006-12-07
Bugzilla
CVE-2006-6235 GnuPG references local variable after function returns2006-12-05
CVE-2006-6235 — GNU Privacy Guard vulnerability | cvebase