CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
92.5%
The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.
Vendor | Product | Version | CPE |
---|---|---|---|
gnupg | gnupg | 1.4.0 | cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:* |
gnupg | gnupg | 1.4.2 | cpe:2.3:a:gnupg:gnupg:1.4.2:*:*:*:*:*:*:* |
gnupg | gnupg | 1.4.3 | cpe:2.3:a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:* |
gnupg | gnupg | 1.4.4 | cpe:2.3:a:gnupg:gnupg:1.4.4:*:*:*:*:*:*:* |
gnupg | gnupg | 1.4.5 | cpe:2.3:a:gnupg:gnupg:1.4.5:*:*:*:*:*:*:* |
gnupg | gnupg | 1.4.8 | cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:* |
gnupg | gnupg | 1.4.10 | cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:* |
gnupg | gnupg | 1.4.11 | cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:* |
gnupg | gnupg | 1.4.12 | cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:* |
gnupg | gnupg | 1.4.13 | cpe:2.3:a:gnupg:gnupg:1.4.13:*:*:*:*:*:*:* |
bugs.debian.org/cgi-bin/bugreport.cgi?bug=725433
lists.gnupg.org/pipermail/gnupg-announce/2013q4/000333.html
lists.gnupg.org/pipermail/gnupg-announce/2013q4/000334.html
lists.opensuse.org/opensuse-updates/2013-10/msg00020.html
lists.opensuse.org/opensuse-updates/2013-10/msg00025.html
rhn.redhat.com/errata/RHSA-2013-1459.html
www.debian.org/security/2013/dsa-2773
www.debian.org/security/2013/dsa-2774
www.ubuntu.com/usn/USN-1987-1
bugzilla.redhat.com/show_bug.cgi?id=1015685