Computer Security
[EN] securityvulns.ru no-pyccku


GnuPG Made Easy memory corruption
Published:11.08.2014
Source:
SecurityVulns ID:13919
Type:library
Threat Level:
5/10
Description:Memory corruption on certificates parsing.
Affected:GNU : gpgme 1.4
CVE:CVE-2014-3564 (Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order.")
Original documentdocumentUBUNTU, [USN-2307-1] GPGME vulnerability (11.08.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod