A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc - | |
References | () http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html - | |
References | () http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html - | |
References | () http://secunia.com/advisories/23245 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/23250 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/23255 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/23259 - | |
References | () http://secunia.com/advisories/23269 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/23284 - | |
References | () http://secunia.com/advisories/23290 - | |
References | () http://secunia.com/advisories/23299 - | |
References | () http://secunia.com/advisories/23303 - | |
References | () http://secunia.com/advisories/23329 - | |
References | () http://secunia.com/advisories/23335 - | |
References | () http://secunia.com/advisories/23513 - | |
References | () http://secunia.com/advisories/24047 - | |
References | () http://security.gentoo.org/glsa/glsa-200612-03.xml - | |
References | () http://securitytracker.com/id?1017349 - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm - | |
References | () http://www.debian.org/security/2006/dsa-1231 - | |
References | () http://www.kb.cert.org/vuls/id/427009 - US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:228 - | |
References | () http://www.novell.com/linux/security/advisories/2006_28_sr.html - | |
References | () http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0754.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/453664/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/453723/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21462 - Vendor Advisory | |
References | () http://www.trustix.org/errata/2006/0070 - | |
References | () http://www.ubuntu.com/usn/usn-393-1 - Patch | |
References | () http://www.ubuntu.com/usn/usn-393-2 - | |
References | () http://www.vupen.com/english/advisories/2006/4881 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30711 - | |
References | () https://issues.rpath.com/browse/RPL-835 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245 - |
Information
Published : 2006-12-07 11:28
Updated : 2025-04-09 00:30
NVD link : CVE-2006-6235
Mitre link : CVE-2006-6235
CVE.ORG link : CVE-2006-6235
JSON object : View
Products Affected
redhat
- enterprise_linux
- fedora_core
- linux_advanced_workstation
- enterprise_linux_desktop
gpg4win
- gpg4win
ubuntu
- ubuntu_linux
gnu
- privacy_guard
rpath
- linux
slackware
- slackware_linux
CWE