kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extensions and "memcpy with overlapping ranges."
References
Link | Resource |
---|---|
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=2183683bd633818dd031b090b5530951de76f392 | |
http://www.openwall.com/lists/oss-security/2015/02/13/14 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/02/14/6 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/72610 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/usn-2554-1/ | Third Party Advisory |
https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html | Third Party Advisory |
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000361.html | Mailing List Release Notes Vendor Advisory |
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000362.html | Mailing List Release Notes Vendor Advisory |
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html | Mailing List Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2019-11-20 19:15
Updated : 2024-02-04 20:39
NVD link : CVE-2015-1607
Mitre link : CVE-2015-1607
CVE.ORG link : CVE-2015-1607
JSON object : View
Products Affected
gnupg
- gnupg
canonical
- ubuntu_linux
CWE
CWE-20
Improper Input Validation