Filtered by vendor Gnupg
Subscribe
Total
47 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2006-3746 | 1 Gnupg | 1 Gnupg | 2024-11-21 | 5.0 MEDIUM | N/A |
Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message. | |||||
CVE-2006-3082 | 1 Gnupg | 1 Gnupg | 2024-11-21 | 5.0 MEDIUM | N/A |
parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option. | |||||
CVE-2005-0366 | 1 Gnupg | 1 Gnupg | 2024-11-20 | 5.0 MEDIUM | N/A |
The integrity check feature in OpenPGP, when handling a message that was encrypted using cipher feedback (CFB) mode, allows remote attackers to recover part of the plaintext via a chosen-ciphertext attack when the first 2 bytes of a message block are known, and an oracle or other mechanism is available to determine whether an integrity check failed. | |||||
CVE-2022-47629 | 2 Debian, Gnupg | 2 Debian Linux, Libksba | 2024-02-28 | N/A | 9.8 CRITICAL |
Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser. | |||||
CVE-2022-3515 | 2 Gnupg, Gpg4win | 4 Gnupg, Libksba, Vs-desktop and 1 more | 2024-02-28 | N/A | 9.8 CRITICAL |
A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment. | |||||
CVE-2022-3219 | 1 Gnupg | 1 Gnupg | 2024-02-28 | N/A | 3.3 LOW |
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB. | |||||
CVE-2022-34903 | 4 Debian, Fedoraproject, Gnupg and 1 more | 5 Debian Linux, Fedora, Gnupg and 2 more | 2024-02-28 | 5.8 MEDIUM | 6.5 MEDIUM |
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line. |