Download
| Alert*
oval:org.secpod.oval:def:1801960
Importing a key with AEAD preferences with GnuPG 2.2 can lead to an array overflow. This is not trivial to exploit because the attacker can control only each second byte with the first byte being fixed at 0x04. But it can be exploited. oval:org.secpod.oval:def:65362 The host is installed with GnuPG 2.2.21 or 2.2.22 and Gpg4win 3.1.12 and is prone to a denial of service vulnerability. A flaws is present in the application, which fails to handle g10/key-check.c error. Successful exploitation allows attackers to crash or cause other unspecified impact when a victi ... |