ID |
CVE-2006-6169
|
Summary |
Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 6.8 (as of 17-10-2018 - 21:47) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
oval
via4
|
accepted | 2013-04-29T04:12:31.217-04:00 | class | vulnerability | contributors | name | Aharon Chernin | organization | SCAP.com, LLC |
name | Dragos Prisaca | organization | G2, Inc. |
| definition_extensions | comment | The operating system installed on the system is Red Hat Enterprise Linux 3 | oval | oval:org.mitre.oval:def:11782 |
comment | CentOS Linux 3.x | oval | oval:org.mitre.oval:def:16651 |
comment | The operating system installed on the system is Red Hat Enterprise Linux 4 | oval | oval:org.mitre.oval:def:11831 |
comment | CentOS Linux 4.x | oval | oval:org.mitre.oval:def:16636 |
comment | Oracle Linux 4.x | oval | oval:org.mitre.oval:def:15990 |
| description | Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt. | family | unix | id | oval:org.mitre.oval:def:11228 | status | accepted | submitted | 2010-07-09T03:56:16-04:00 | title | Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt. | version | 29 |
|
redhat
via4
|
advisories | | rpms | - gnupg-0:1.0.7-20
- gnupg-0:1.2.1-19
- gnupg-0:1.2.6-8
- gnupg-debuginfo-0:1.2.1-19
- gnupg-debuginfo-0:1.2.6-8
|
|
refmap
via4
|
bid | 21306 | bugtraq | - 20061127 GnuPG 1.4 and 2.0 buffer overflow
- 20061201 rPSA-2006-0224-1 gnupg
| confirm | | debian | DSA-1231 | gentoo | GLSA-200612-03 | mandriva | MDKSA-2006:221 | misc | https://bugs.g10code.com/gnupg/issue728 | mlist | [gnupg-announce] 20061127 GnuPG 1.4 and 2.0 buffer overflow | openpkg | OpenPKG-SA-2006.037 | sectrack | 1017291 | secunia | - 23094
- 23110
- 23146
- 23161
- 23171
- 23250
- 23269
- 23284
- 23299
- 23303
- 23513
- 24047
| sgi | 20061201-01-P | sreason | 1927 | suse | SUSE-SA:2006:075 | trustix | 2006-0068 | ubuntu | | vupen | ADV-2006-4736 | xf | gnupg-openfile-bo(30550) |
|
statements
via4
|
contributor | Joshua Bressers | lastmodified | 2007-03-14 | organization | Red Hat | statement | Red Hat does not consider this bug to be a security flaw. In order for this flaw to be exploited, a user would be required to enter shellcode into an interactive GnuPG session. Red Hat considers this to be an unlikely scenario.
Red Hat Enterprise Linux 5 contains a backported patch to address this issue. |
|
Last major update |
17-10-2018 - 21:47 |
Published |
29-11-2006 - 18:28 |
Last modified |
17-10-2018 - 21:47 |