Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git%3Ba=commit%3Bh=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 - | |
References | () http://seclists.org/oss-sec/2014/q3/266 - | |
References | () http://www.debian.org/security/2014/dsa-3005 - | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - | |
References | () http://www.osvdb.org/109699 - | |
References | () http://www.securityfocus.com/bid/68990 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1113267 - Patch |
Information
Published : 2014-10-20 17:55
Updated : 2024-11-21 02:08
NVD link : CVE-2014-3564
Mitre link : CVE-2014-3564
CVE.ORG link : CVE-2014-3564
JSON object : View
Products Affected
gnu
- gpgme
canonical
- ubuntu_linux
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer