A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
References
Link Providers
ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc cve-icon cve-icon
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html cve-icon cve-icon
http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html cve-icon cve-icon
http://secunia.com/advisories/23245 cve-icon cve-icon
http://secunia.com/advisories/23250 cve-icon cve-icon
http://secunia.com/advisories/23255 cve-icon cve-icon
http://secunia.com/advisories/23259 cve-icon cve-icon
http://secunia.com/advisories/23269 cve-icon cve-icon
http://secunia.com/advisories/23284 cve-icon cve-icon
http://secunia.com/advisories/23290 cve-icon cve-icon
http://secunia.com/advisories/23299 cve-icon cve-icon
http://secunia.com/advisories/23303 cve-icon cve-icon
http://secunia.com/advisories/23329 cve-icon cve-icon
http://secunia.com/advisories/23335 cve-icon cve-icon
http://secunia.com/advisories/23513 cve-icon cve-icon
http://secunia.com/advisories/24047 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200612-03.xml cve-icon cve-icon
http://securitytracker.com/id?1017349 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1231 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/427009 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2006:228 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2006_28_sr.html cve-icon cve-icon
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0754.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/453664/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/453723/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/21462 cve-icon cve-icon
http://www.trustix.org/errata/2006/0070 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-393-1 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-393-2 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/4881 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/30711 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-835 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2006-6235 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2006-6235 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2006-12-07T11:00:00

Updated: 2024-08-07T20:19:35.196Z

Reserved: 2006-12-02T00:00:00

Link: CVE-2006-6235

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2006-12-07T11:28:00.000

Modified: 2024-11-21T00:22:13.590

Link: CVE-2006-6235

cve-icon Redhat

Severity : Important

Publid Date: 2006-12-06T00:00:00Z

Links: CVE-2006-6235 - Bugzilla