Download
| Alert*
oval:org.secpod.oval:def:21834
The host is installed with gpgme before 1.5.1 and is prone to multiple heap-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle vectors related to "different line lengths in a specific order". Successful exploitation allow remote attackers ... oval:org.secpod.oval:def:601751 Tomas Trnka discovered a heap-based buffer overflow within the gpgsm status handler of GPGME, a library designed to make access to GnuPG easier for applications. An attacker could use this issue to cause an application using GPGME to crash or possibly to execute arbitrary code. oval:org.secpod.oval:def:1200162 Multiple heap-based buffer overflows in the status_handler function in engine-gpgsm.c and engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service and possibly execute arbitrary code via vectors related to "different line lengths in a specific order." oval:org.secpod.oval:def:702157 gpgme1.0: GPGME - GnuPG Made Easy GPGME could be made to crash or run programs as your login if it processed a specially crafted certificate. oval:org.secpod.oval:def:108110 GnuPG Made Easy is a library designed to make access to GnuPG easier for applications. It provides a high-level crypto API for encryption, decryption, signing, signature verification and key management. oval:org.secpod.oval:def:108198 GnuPG Made Easy is a library designed to make access to GnuPG easier for applications. It provides a high-level crypto API for encryption, decryption, signing, signature verification and key management. oval:org.secpod.oval:def:52276 gpgme1.0: GPGME - GnuPG Made Easy GPGME could be made to crash or run programs as your login if it processed a specially crafted certificate. |