Vulnerabilities > CVE-2008-1530 - Resource Management Errors vulnerability in Gnupg 1.4.8/2.0.8
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | FreeBSD Local Security Checks |
NASL id | FREEBSD_PKG_3039465113E111DDBAB70016179B2DD5.NASL |
description | Secunia reports : A vulnerability has been reported in GnuPG, which can potentially be exploited to compromise a vulnerable system. The vulnerability is caused due to an error when importing keys with duplicated IDs. This can be exploited to cause a memory corruption when importing keys via --refresh-keys or --import. Successful exploitation potentially allows execution of arbitrary code, but has not been proven yet. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 32061 |
published | 2008-04-28 |
reporter | This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/32061 |
title | FreeBSD : gnupg -- memory corruption vulnerability (30394651-13e1-11dd-bab7-0016179b2dd5) |
code |
|
Statements
contributor | Mark J Cox |
lastmodified | 2008-03-28 |
organization | Red Hat |
statement | Not vulnerable. This issue does not affect the versions of gnupg packages as shipped with Red Hat Enterprise Linux versions 2.1, 3, 4 or 5. |
References
- http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html
- http://lists.gnupg.org/pipermail/gnupg-announce/2008q1/000272.html
- http://secunia.com/advisories/29568
- http://secunia.com/advisories/29568
- http://www.ocert.org/advisories/ocert-2008-1.html
- http://www.ocert.org/advisories/ocert-2008-1.html
- http://www.securityfocus.com/bid/28487
- http://www.securityfocus.com/bid/28487
- http://www.vupen.com/english/advisories/2008/1056/references
- http://www.vupen.com/english/advisories/2008/1056/references
- https://bugs.g10code.com/gnupg/issue894
- https://bugs.g10code.com/gnupg/issue894
- https://bugs.gentoo.org/show_bug.cgi?id=214990
- https://bugs.gentoo.org/show_bug.cgi?id=214990
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41547
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41547