GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html - | |
References | () http://secunia.com/advisories/29568 - Vendor Advisory | |
References | () http://www.ocert.org/advisories/ocert-2008-1.html - | |
References | () http://www.securityfocus.com/bid/28487 - | |
References | () http://www.vupen.com/english/advisories/2008/1056/references - | |
References | () https://bugs.g10code.com/gnupg/issue894 - | |
References | () https://bugs.gentoo.org/show_bug.cgi?id=214990 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41547 - |
Information
Published : 2008-03-27 23:44
Updated : 2024-11-21 00:44
NVD link : CVE-2008-1530
Mitre link : CVE-2008-1530
CVE.ORG link : CVE-2008-1530
JSON object : View
Products Affected
gnupg
- gnupg
CWE
CWE-399
Resource Management Errors