Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 157340

Summary: GnuPG: remotely controllable function pointer [CVE-2006-6235]
Product: Gentoo Security Reporter: Antoine Martin <antoine>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED DUPLICATE    
Severity: major CC: crypto+disabled, rajiv
Priority: Highest    
Version: unspecified   
Hardware: All   
OS: All   
URL: http://lwn.net/Articles/212909/
Whiteboard:
Package list:
Runtime testing required: ---

Description Antoine Martin 2006-12-06 09:25:13 UTC
Summary
=======

Tavis Ormandy of the Gentoo security team identified a severe and
exploitable bug in the processing of encrypted packets in GnuPG.

[ Please do not send private mail in response to this message.  The
  mailing list gnupg-devel is the best place to discuss this problem
  (please subscribe first so you don't need moderator approval [1]). ]


Impact
======

Using malformed OpenPGP packets an attacker is able to modify and
dereference a function pointer in GnuPG.  This is a remotely
exploitable bug and affects any use of GnuPG where an attacker can
control the data processed by GnuPG.  It is not necessary limited to
encrypted data, also signed data may be affected.

Affected versions: All versions of GnuPG   < 1.4.6 
                   All versions of GnuPG-2 < 2.0.2
                   All beta versions of GnuPG-2 (1.9.0 .. 1.9.95)
Affected tools: gpg, gpgv, gpg2 and gpgv2.
Affected platforms: All.

gpg-agent, gpgsm as well as other tools are not affected.

A workaround is not known.
Comment 1 Rajiv Aaron Manglani (RETIRED) gentoo-dev 2006-12-06 12:14:57 UTC

*** This bug has been marked as a duplicate of 156947 ***