[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Multiple heap-based buffer overflow vulnerabilities in the status_handler function in gpgme

ID: oval:org.secpod.oval:def:21834Date: (C)2014-12-03   (M)2023-02-20
Class: VULNERABILITYFamily: unix




The host is installed with gpgme before 1.5.1 and is prone to multiple heap-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle vectors related to "different line lengths in a specific order". Successful exploitation allow remote attackers to cause a denial of service (crash).

Platform:
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 6
Product:
gpgme
Reference:
CVE-2014-3564
CVE    1
CVE-2014-3564
CPE    4
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:6
cpe:/a:gnu:gpgme:1.5.0
cpe:/a:gnu:gpgme
...

© SecPod Technologies