Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1115] DSA-1115-1 gnupg2


Vulnerability Assessment Details

[DSA1115] DSA-1115-1 gnupg2

Vulnerability Assessment Summary
DSA-1115-1 gnupg2

Detailed Explanation for this Vulnerability Assessment

Evgeny Legerov discovered that gnupg, the GNU privacy guard, a free
PGP replacement contains an integer overflow that can cause a
segmentation fault and possibly overwrite memory via a large user ID
string.
For the stable distribution (sarge) this problem has been fixed in
version 1.4.1-1.sarge4 of GnuPG and in version 1.9.15-6sarge1 of GnuPG2.
For the unstable distribution (sid) this problem has been fixed in
version 1.4.3-2 of GnuPG, a fix for GnuPG2 is pending.
We recommend that you upgrade your gnupg package.


Solution : http://www.debian.org/security/2006/dsa-1115
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

375-3499-02 P34477-02-B SUN 2540 SAN FC RAID CONTROLLER MODULE
$220.0
375-3499-02 P34477-02-B SUN 2540 SAN FC RAID CONTROLLER MODULE pictureDell H710 Mini RAID Controller 512MB 6Gbps PERC WR9NT w/ Battery M620
$75.0
Dell H710 Mini RAID Controller 512MB 6Gbps PERC WR9NT w/ Battery M620 pictureDELL Poweredge R710 2.5" PERC H700 R374M INTEGRATED SAS SATA RAID CONTROLLER
$42.0
DELL Poweredge R710 2.5for old PC with PCI slot, add 2 Internal S-ATA ports for SATA HD, software RAID
$23.14
for old PC with PCI slot, add 2 Internal S-ATA ports for SATA HD, software RAID picture


Discussions

No Discussions have been posted on this vulnerability.