Lucene search

K
ubuntuUbuntuUSN-393-1
HistoryDec 07, 2006 - 12:00 a.m.

GnuPG vulnerability

2006-12-0700:00:00
ubuntu.com
30

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.1 High

AI Score

Confidence

Low

0.056 Low

EPSS

Percentile

93.3%

Releases

  • Ubuntu 6.10
  • Ubuntu 6.06
  • Ubuntu 5.10

Details

Tavis Ormandy discovered that gnupg was incorrectly using the stack. If
a user were tricked into processing a specially crafted message, an
attacker could execute arbitrary code with the user’s privileges.

OSVersionArchitecturePackageVersionFilename
Ubuntu6.10noarchgnupg< 1.4.3-2ubuntu3.2UNKNOWN
Ubuntu6.06noarchgnupg< 1.4.2.2-1ubuntu2.4UNKNOWN
Ubuntu5.10noarchgnupg< 1.4.1-1ubuntu1.6UNKNOWN

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.1 High

AI Score

Confidence

Low

0.056 Low

EPSS

Percentile

93.3%