CVE-2006-6235

A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html
http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html
http://secunia.com/advisories/23245 Patch Vendor Advisory
http://secunia.com/advisories/23250 Patch Vendor Advisory
http://secunia.com/advisories/23255 Patch Vendor Advisory
http://secunia.com/advisories/23259
http://secunia.com/advisories/23269 Patch Vendor Advisory
http://secunia.com/advisories/23284
http://secunia.com/advisories/23290
http://secunia.com/advisories/23299
http://secunia.com/advisories/23303
http://secunia.com/advisories/23329
http://secunia.com/advisories/23335
http://secunia.com/advisories/23513
http://secunia.com/advisories/24047
http://security.gentoo.org/glsa/glsa-200612-03.xml
http://securitytracker.com/id?1017349
http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm
http://www.debian.org/security/2006/dsa-1231
http://www.kb.cert.org/vuls/id/427009 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:228
http://www.novell.com/linux/security/advisories/2006_28_sr.html
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html
http://www.redhat.com/support/errata/RHSA-2006-0754.html Vendor Advisory
http://www.securityfocus.com/archive/1/453664/100/0/threaded
http://www.securityfocus.com/archive/1/453723/100/0/threaded
http://www.securityfocus.com/bid/21462 Vendor Advisory
http://www.trustix.org/errata/2006/0070
http://www.ubuntu.com/usn/usn-393-1 Patch
http://www.ubuntu.com/usn/usn-393-2
http://www.vupen.com/english/advisories/2006/4881
https://exchange.xforce.ibmcloud.com/vulnerabilities/30711
https://issues.rpath.com/browse/RPL-835
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245
ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html
http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html
http://secunia.com/advisories/23245 Patch Vendor Advisory
http://secunia.com/advisories/23250 Patch Vendor Advisory
http://secunia.com/advisories/23255 Patch Vendor Advisory
http://secunia.com/advisories/23259
http://secunia.com/advisories/23269 Patch Vendor Advisory
http://secunia.com/advisories/23284
http://secunia.com/advisories/23290
http://secunia.com/advisories/23299
http://secunia.com/advisories/23303
http://secunia.com/advisories/23329
http://secunia.com/advisories/23335
http://secunia.com/advisories/23513
http://secunia.com/advisories/24047
http://security.gentoo.org/glsa/glsa-200612-03.xml
http://securitytracker.com/id?1017349
http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm
http://www.debian.org/security/2006/dsa-1231
http://www.kb.cert.org/vuls/id/427009 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:228
http://www.novell.com/linux/security/advisories/2006_28_sr.html
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html
http://www.redhat.com/support/errata/RHSA-2006-0754.html Vendor Advisory
http://www.securityfocus.com/archive/1/453664/100/0/threaded
http://www.securityfocus.com/archive/1/453723/100/0/threaded
http://www.securityfocus.com/bid/21462 Vendor Advisory
http://www.trustix.org/errata/2006/0070
http://www.ubuntu.com/usn/usn-393-1 Patch
http://www.ubuntu.com/usn/usn-393-2
http://www.vupen.com/english/advisories/2006/4881
https://exchange.xforce.ibmcloud.com/vulnerabilities/30711
https://issues.rpath.com/browse/RPL-835
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:privacy_guard:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.9.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.9.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:1.9.20:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:privacy_guard:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gpg4win:gpg4win:1.0.7:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core_5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
cpe:2.3:o:rpath:linux:1:*:*:*:*:*:*:*
cpe:2.3:o:slackware:slackware_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:*:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc - () ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc -
References () http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html - () http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html -
References () http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html - () http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html -
References () http://secunia.com/advisories/23245 - Patch, Vendor Advisory () http://secunia.com/advisories/23245 - Patch, Vendor Advisory
References () http://secunia.com/advisories/23250 - Patch, Vendor Advisory () http://secunia.com/advisories/23250 - Patch, Vendor Advisory
References () http://secunia.com/advisories/23255 - Patch, Vendor Advisory () http://secunia.com/advisories/23255 - Patch, Vendor Advisory
References () http://secunia.com/advisories/23259 - () http://secunia.com/advisories/23259 -
References () http://secunia.com/advisories/23269 - Patch, Vendor Advisory () http://secunia.com/advisories/23269 - Patch, Vendor Advisory
References () http://secunia.com/advisories/23284 - () http://secunia.com/advisories/23284 -
References () http://secunia.com/advisories/23290 - () http://secunia.com/advisories/23290 -
References () http://secunia.com/advisories/23299 - () http://secunia.com/advisories/23299 -
References () http://secunia.com/advisories/23303 - () http://secunia.com/advisories/23303 -
References () http://secunia.com/advisories/23329 - () http://secunia.com/advisories/23329 -
References () http://secunia.com/advisories/23335 - () http://secunia.com/advisories/23335 -
References () http://secunia.com/advisories/23513 - () http://secunia.com/advisories/23513 -
References () http://secunia.com/advisories/24047 - () http://secunia.com/advisories/24047 -
References () http://security.gentoo.org/glsa/glsa-200612-03.xml - () http://security.gentoo.org/glsa/glsa-200612-03.xml -
References () http://securitytracker.com/id?1017349 - () http://securitytracker.com/id?1017349 -
References () http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm - () http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm -
References () http://www.debian.org/security/2006/dsa-1231 - () http://www.debian.org/security/2006/dsa-1231 -
References () http://www.kb.cert.org/vuls/id/427009 - US Government Resource () http://www.kb.cert.org/vuls/id/427009 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:228 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:228 -
References () http://www.novell.com/linux/security/advisories/2006_28_sr.html - () http://www.novell.com/linux/security/advisories/2006_28_sr.html -
References () http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html - () http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html -
References () http://www.redhat.com/support/errata/RHSA-2006-0754.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2006-0754.html - Vendor Advisory
References () http://www.securityfocus.com/archive/1/453664/100/0/threaded - () http://www.securityfocus.com/archive/1/453664/100/0/threaded -
References () http://www.securityfocus.com/archive/1/453723/100/0/threaded - () http://www.securityfocus.com/archive/1/453723/100/0/threaded -
References () http://www.securityfocus.com/bid/21462 - Vendor Advisory () http://www.securityfocus.com/bid/21462 - Vendor Advisory
References () http://www.trustix.org/errata/2006/0070 - () http://www.trustix.org/errata/2006/0070 -
References () http://www.ubuntu.com/usn/usn-393-1 - Patch () http://www.ubuntu.com/usn/usn-393-1 - Patch
References () http://www.ubuntu.com/usn/usn-393-2 - () http://www.ubuntu.com/usn/usn-393-2 -
References () http://www.vupen.com/english/advisories/2006/4881 - () http://www.vupen.com/english/advisories/2006/4881 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30711 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30711 -
References () https://issues.rpath.com/browse/RPL-835 - () https://issues.rpath.com/browse/RPL-835 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245 -

Information

Published : 2006-12-07 11:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6235

Mitre link : CVE-2006-6235

CVE.ORG link : CVE-2006-6235


JSON object : View

Products Affected

slackware

  • slackware_linux

redhat

  • fedora_core
  • enterprise_linux
  • enterprise_linux_desktop
  • linux_advanced_workstation

gnu

  • privacy_guard

rpath

  • linux

ubuntu

  • ubuntu_linux

gpg4win

  • gpg4win