CVE-2014-9087Integer Underflow (Wrap or Wraparound) in Libksba

Severity
7.5HIGHNVD
EPSS
6.9%
top 8.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 1
Latest updateMay 13

Description

Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages4 packages

NVDgnupg/libksba< 1.3.2
Debiangnupg/libksba< 1.3.2-1+3
NVDgnupg/gnupg2.1.0
NVDmageia/mageia3.0, 4.0+1

Also affects: Debian Linux 7.0, 8.0, Ubuntu Linux 12.04, 14.04, 14.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-vqgr-f24j-7rxx: Integer underflow in the ksba_oid_to_str function in Libksba before 12022-05-13
OSV
CVE-2014-9087: Integer underflow in the ksba_oid_to_str function in Libksba before 12014-12-01
CVEList
CVE-2014-9087: Integer underflow in the ksba_oid_to_str function in Libksba before 12014-12-01

📋Vendor Advisories

3
Ubuntu
Libksba vulnerability2014-11-27
Red Hat
libksba: integer underflow flaw leading to a heap-based buffer overflow in ksba_oid_to_str()2014-11-25
Debian
CVE-2014-9087: gnupg2 - Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as us...2014

💬Community

1
Bugzilla
CVE-2014-9087 libksba: integer underflow flaw leading to a heap-based buffer overflow in ksba_oid_to_str()2014-11-26