Vulnerabilities > Gnupg

DATE CVE VULNERABILITY TITLE RISK
2006-11-29 CVE-2006-6169 Remote Buffer Overflow vulnerability in Gnupg 1.4/2.0
Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.
network
gnupg
6.8
2006-06-19 CVE-2006-3082 Numeric Errors vulnerability in Gnupg
parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.
network
low complexity
gnupg CWE-189
5.0
2005-05-02 CVE-2005-0366 Inadequate Encryption Strength vulnerability in Gnupg
The integrity check feature in OpenPGP, when handling a message that was encrypted using cipher feedback (CFB) mode, allows remote attackers to recover part of the plaintext via a chosen-ciphertext attack when the first 2 bytes of a message block are known, and an oracle or other mechanism is available to determine whether an integrity check failed.
network
low complexity
gnupg CWE-326
5.0