CVE-2014-4617

The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
References
Link Resource
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=014b2103fcb12f261135e3954f26e9e07b39e342
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html Mailing List Vendor Advisory
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000345.html Mailing List Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html Third Party Advisory
http://secunia.com/advisories/59213
http://secunia.com/advisories/59351
http://secunia.com/advisories/59534
http://secunia.com/advisories/59578
http://www.debian.org/security/2014/dsa-2967
http://www.debian.org/security/2014/dsa-2968 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.ubuntu.com/usn/USN-2258-1
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=014b2103fcb12f261135e3954f26e9e07b39e342
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html Mailing List Vendor Advisory
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000345.html Mailing List Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html Third Party Advisory
http://secunia.com/advisories/59213
http://secunia.com/advisories/59351
http://secunia.com/advisories/59534
http://secunia.com/advisories/59578
http://www.debian.org/security/2014/dsa-2967
http://www.debian.org/security/2014/dsa-2968 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.ubuntu.com/usn/USN-2258-1
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnupg:gnupg:2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.20:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.21:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.22:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:2.0.23:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.3.90:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.3.91:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.3.92:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.3.93:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.4.13:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.4.14:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:gnupg:1.4.15:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:10

Type Values Removed Values Added
References () http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=014b2103fcb12f261135e3954f26e9e07b39e342 - () http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=014b2103fcb12f261135e3954f26e9e07b39e342 -
References () http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a - () http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a -
References () http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html - Mailing List, Vendor Advisory () http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html - Mailing List, Vendor Advisory
References () http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000345.html - Mailing List, Vendor Advisory () http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000345.html - Mailing List, Vendor Advisory
References () http://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html - Third Party Advisory
References () http://secunia.com/advisories/59213 - () http://secunia.com/advisories/59213 -
References () http://secunia.com/advisories/59351 - () http://secunia.com/advisories/59351 -
References () http://secunia.com/advisories/59534 - () http://secunia.com/advisories/59534 -
References () http://secunia.com/advisories/59578 - () http://secunia.com/advisories/59578 -
References () http://www.debian.org/security/2014/dsa-2967 - () http://www.debian.org/security/2014/dsa-2967 -
References () http://www.debian.org/security/2014/dsa-2968 - Third Party Advisory () http://www.debian.org/security/2014/dsa-2968 - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html - () http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html -
References () http://www.ubuntu.com/usn/USN-2258-1 - () http://www.ubuntu.com/usn/USN-2258-1 -

07 Nov 2023, 02:20

Type Values Removed Values Added
References
  • {'url': 'http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342', 'name': 'http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342', 'tags': ['Patch', 'Issue Tracking'], 'refsource': 'CONFIRM'}
  • {'url': 'http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a', 'name': 'http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a', 'tags': ['Patch', 'Issue Tracking'], 'refsource': 'CONFIRM'}
  • () http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a -
  • () http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=014b2103fcb12f261135e3954f26e9e07b39e342 -

Information

Published : 2014-06-25 11:19

Updated : 2024-11-21 02:10


NVD link : CVE-2014-4617

Mitre link : CVE-2014-4617

CVE.ORG link : CVE-2014-4617


JSON object : View

Products Affected

gnupg

  • gnupg

opensuse

  • opensuse

debian

  • debian_linux
CWE
CWE-20

Improper Input Validation