8.1

CVE-2010-2547

Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.

Data is provided by the National Vulnerability Database (NVD)
GnupgGnupg Version >= 2.0.0 <= 2.0.16
FedoraprojectFedora Version13
DebianDebian Linux Version5.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 15.1% 0.94
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.1 2.2 5.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 5.1 4.9 6.4
AV:N/AC:H/Au:N/C:P/I:P/A:P
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.

http://secunia.com/advisories/38877
Vendor Advisory
Broken Link
http://secunia.com/advisories/40718
Vendor Advisory
Broken Link
http://secunia.com/advisories/40841
Vendor Advisory
Broken Link
http://www.debian.org/security/2010/dsa-2076
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/41945
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1024247
Third Party Advisory
Broken Link
VDB Entry