CVE
- Id
- 19186
- CVE No.
- CVE-2006-3082
- Status
- Candidate
- Description
- parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.
- Phase
- Assigned (20060619)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
171095 | 19186 | CVE-2006-3082 | BUGTRAQ:20060629 rPSA-2006-0120-1 gnupg | View |
171096 | 19186 | CVE-2006-3082 | URL:http://www.securityfocus.com/archive/1/archive/1/438751/100/0/threaded | View |
171097 | 19186 | CVE-2006-3082 | FULLDISC:20060531 GnuPG fun | View |
171098 | 19186 | CVE-2006-3082 | URL:http://seclists.org/lists/fulldisclosure/2006/May/0774.html | View |
171099 | 19186 | CVE-2006-3082 | FULLDISC:20060601 Re: GnuPG fun | View |
171100 | 19186 | CVE-2006-3082 | URL:http://seclists.org/lists/fulldisclosure/2006/May/0789.html | View |
171101 | 19186 | CVE-2006-3082 | FULLDISC:20060531 RE: GnuPG fun | View |
171102 | 19186 | CVE-2006-3082 | URL:http://seclists.org/lists/fulldisclosure/2006/May/0782.html | View |
171103 | 19186 | CVE-2006-3082 | CONFIRM:http://cvs.gnupg.org/cgi-bin/viewcvs.cgi/trunk/g10/parse-packet.c?rev=4157&r1=4141&r2=4157 | View |
171104 | 19186 | CVE-2006-3082 | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2006-167.htm | View |
171105 | 19186 | CVE-2006-3082 | DEBIAN:DSA-1107 | View |
171106 | 19186 | CVE-2006-3082 | URL:http://www.debian.org/security/2006/dsa-1107 | View |
171107 | 19186 | CVE-2006-3082 | DEBIAN:DSA-1115 | View |
171108 | 19186 | CVE-2006-3082 | URL:http://www.debian.org/security/2006/dsa-1115 | View |
171109 | 19186 | CVE-2006-3082 | MANDRIVA:MDKSA-2006:110 | View |
171110 | 19186 | CVE-2006-3082 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2006:110 | View |
171111 | 19186 | CVE-2006-3082 | OPENPKG:OpenPKG-SA-2006.010 | View |
171112 | 19186 | CVE-2006-3082 | URL:http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.010.html | View |
171113 | 19186 | CVE-2006-3082 | REDHAT:RHSA-2006:0571 | View |
171114 | 19186 | CVE-2006-3082 | URL:http://www.redhat.com/support/errata/RHSA-2006-0571.html | View |
171115 | 19186 | CVE-2006-3082 | SGI:20060701-01-U | View |
171116 | 19186 | CVE-2006-3082 | URL:ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U | View |
171117 | 19186 | CVE-2006-3082 | SLACKWARE:SSA:2006-178-02 | View |
171118 | 19186 | CVE-2006-3082 | URL:http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.457382 | View |
171119 | 19186 | CVE-2006-3082 | SUSE:SUSE-SR:2006:015 | View |
171120 | 19186 | CVE-2006-3082 | URL:http://www.novell.com/linux/security/advisories/2006_38_security.html | View |
171121 | 19186 | CVE-2006-3082 | SUSE:SUSE-SR:2006:018 | View |
171122 | 19186 | CVE-2006-3082 | URL:http://www.novell.com/linux/security/advisories/2006_18_sr.html | View |
171123 | 19186 | CVE-2006-3082 | UBUNTU:USN-304-1 | View |
171124 | 19186 | CVE-2006-3082 | URL:http://www.ubuntulinux.org/support/documentation/usn/usn-304-1 | View |
171125 | 19186 | CVE-2006-3082 | BID:18554 | View |
171126 | 19186 | CVE-2006-3082 | URL:http://www.securityfocus.com/bid/18554 | View |
171127 | 19186 | CVE-2006-3082 | OVAL:oval:org.mitre.oval:def:10089 | View |
171128 | 19186 | CVE-2006-3082 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10089 | View |
171129 | 19186 | CVE-2006-3082 | VUPEN:ADV-2006-2450 | View |
171130 | 19186 | CVE-2006-3082 | URL:http://www.vupen.com/english/advisories/2006/2450 | View |
171131 | 19186 | CVE-2006-3082 | SECTRACK:1016519 | View |
171132 | 19186 | CVE-2006-3082 | URL:http://securitytracker.com/id?1016519 | View |
171133 | 19186 | CVE-2006-3082 | SECUNIA:20783 | View |
171134 | 19186 | CVE-2006-3082 | URL:http://secunia.com/advisories/20783 | View |
171135 | 19186 | CVE-2006-3082 | SECUNIA:20829 | View |
171136 | 19186 | CVE-2006-3082 | URL:http://secunia.com/advisories/20829 | View |
171137 | 19186 | CVE-2006-3082 | SECUNIA:20801 | View |
171138 | 19186 | CVE-2006-3082 | URL:http://secunia.com/advisories/20801 | View |
171139 | 19186 | CVE-2006-3082 | SECUNIA:20811 | View |
171140 | 19186 | CVE-2006-3082 | URL:http://secunia.com/advisories/20811 | View |
171141 | 19186 | CVE-2006-3082 | SECUNIA:20881 | View |
171142 | 19186 | CVE-2006-3082 | URL:http://secunia.com/advisories/20881 | View |
171143 | 19186 | CVE-2006-3082 | SECUNIA:20899 | View |
171144 | 19186 | CVE-2006-3082 | URL:http://secunia.com/advisories/20899 | View |
171145 | 19186 | CVE-2006-3082 | SECUNIA:20968 | View |
171146 | 19186 | CVE-2006-3082 | URL:http://secunia.com/advisories/20968 | View |
171147 | 19186 | CVE-2006-3082 | SECUNIA:21063 | View |
171148 | 19186 | CVE-2006-3082 | URL:http://secunia.com/advisories/21063 | View |
171149 | 19186 | CVE-2006-3082 | SECUNIA:21143 | View |
171150 | 19186 | CVE-2006-3082 | URL:http://secunia.com/advisories/21143 | View |
171151 | 19186 | CVE-2006-3082 | SECUNIA:21137 | View |
171152 | 19186 | CVE-2006-3082 | URL:http://secunia.com/advisories/21137 | View |
171153 | 19186 | CVE-2006-3082 | SECUNIA:21135 | View |
171154 | 19186 | CVE-2006-3082 | URL:http://secunia.com/advisories/21135 | View |
171155 | 19186 | CVE-2006-3082 | SECUNIA:21585 | View |
171156 | 19186 | CVE-2006-3082 | URL:http://secunia.com/advisories/21585 | View |
171157 | 19186 | CVE-2006-3082 | XF:gnupg-parsepacket-bo(27245) | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
58670 | JVNDB-2006-000930 | MIT Kerberos5 (krb5) の ftpd および ksu の権限昇格に関する脆弱性 | MIT Kerberos5 (krb5) の ftpd および ksu プログラムには setuid() の戻り値の取扱いに問題があるため、権限昇格の脆弱性が存在します。 | CVE-2006-3084 | 19186 | 7.2 | http://jvndb.jvn.jp/ja/contents/2006/JVNDB-2006-000930.html | View |