Gnupg

Gnupg

30 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.47%
  • Published 20.11.2019 19:15:11
  • Last modified 21.11.2024 02:25:45

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.

Exploit
  • EPSS 0.74%
  • Published 29.06.2019 17:15:08
  • Last modified 21.11.2024 04:24:06

Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this n...

Exploit
  • EPSS 0.21%
  • Published 20.12.2018 17:29:00
  • Last modified 21.11.2024 03:40:30

GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e...

  • EPSS 1.56%
  • Published 08.06.2018 21:29:00
  • Last modified 21.11.2024 03:44:25

mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" optio...

  • EPSS 0.17%
  • Published 04.04.2018 00:29:00
  • Last modified 21.11.2024 04:15:10

GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey.

  • EPSS 4.1%
  • Published 13.12.2016 20:59:04
  • Last modified 12.04.2025 10:46:40

The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 46...

  • EPSS 7.75%
  • Published 01.12.2014 15:59:11
  • Last modified 12.04.2025 10:46:40

Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer...

  • EPSS 8.03%
  • Published 25.06.2014 11:19:22
  • Last modified 12.04.2025 10:46:40

The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte seq...

  • EPSS 0.11%
  • Published 20.12.2013 21:55:06
  • Last modified 11.04.2025 00:51:21

GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis...

  • EPSS 4.68%
  • Published 28.10.2013 22:55:03
  • Last modified 11.04.2025 00:51:21

The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.