[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2773-1 gnupg -- several

ID: oval:org.secpod.oval:def:601124Date: (C)2013-10-11   (M)2023-12-07
Class: PATCHFamily: unix




Two vulnerabilities were discovered in GnuPG, the GNU privacy guard, a free PGP replacement. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2013-4351 When a key or subkey had its "key flags" subpacket set to all bits off, GnuPG currently would treat the key as having all bits set. That is, where the owner wanted to indicate "no use permitted", GnuPG would interpret it as "all use permitted". Such "no use permitted" keys are rare and only used in very special circumstances. CVE-2013-4402 Infinite recursion in the compressed packet parser was possible with crafted input data, which may be used to cause a denial of service.

Platform:
Debian 7.0
Debian 6.0
Product:
gnupg
Reference:
DSA-2773-1
CVE-2013-4351
CVE-2013-4402
CVE    2
CVE-2013-4351
CVE-2013-4402
CPE    35
cpe:/a:gnupg:gnupg:2.0
cpe:/a:gnupg:gnupg:2.1.0:beta1
cpe:/a:gnupg:gnupg:1.4.8
cpe:/o:debian:debian_linux:6.0
...

© SecPod Technologies