[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:21834
The host is installed with gpgme before 1.5.1 and is prone to multiple heap-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle vectors related to "different line lengths in a specific order". Successful exploitation allow remote attackers ...

oval:org.secpod.oval:def:601751
Tomas Trnka discovered a heap-based buffer overflow within the gpgsm status handler of GPGME, a library designed to make access to GnuPG easier for applications. An attacker could use this issue to cause an application using GPGME to crash or possibly to execute arbitrary code.

oval:org.secpod.oval:def:1200162
Multiple heap-based buffer overflows in the status_handler function in engine-gpgsm.c and engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."

oval:org.secpod.oval:def:702157
gpgme1.0: GPGME - GnuPG Made Easy GPGME could be made to crash or run programs as your login if it processed a specially crafted certificate.

oval:org.secpod.oval:def:108110
GnuPG Made Easy is a library designed to make access to GnuPG easier for applications. It provides a high-level crypto API for encryption, decryption, signing, signature verification and key management.

oval:org.secpod.oval:def:108198
GnuPG Made Easy is a library designed to make access to GnuPG easier for applications. It provides a high-level crypto API for encryption, decryption, signing, signature verification and key management.

oval:org.secpod.oval:def:52276
gpgme1.0: GPGME - GnuPG Made Easy GPGME could be made to crash or run programs as your login if it processed a specially crafted certificate.

CWE    1
CWE-119
*CVE
CVE-2014-3564

© SecPod Technologies