CVE-2006-6235
Summary
| CVE | CVE-2006-6235 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-12-07 11:28:00 UTC |
| Updated | 2018-10-17 21:47:00 UTC |
| Description | A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Gnu | Privacy Guard | 1.2.4 | All | All | All |
| Application | Gnu | Privacy Guard | 1.2.5 | All | All | All |
| Application | Gnu | Privacy Guard | 1.2.6 | All | All | All |
| Application | Gnu | Privacy Guard | 1.2.7 | All | All | All |
| Application | Gnu | Privacy Guard | 1.3.3 | All | All | All |
| Application | Gnu | Privacy Guard | 1.3.4 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.1 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.2 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.2.1 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.2.2 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.3 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.4 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.5 | All | All | All |
| Application | Gnu | Privacy Guard | 1.9.10 | All | All | All |
| Application | Gnu | Privacy Guard | 1.9.15 | All | All | All |
| Application | Gnu | Privacy Guard | 1.9.20 | All | All | All |
| Application | Gnu | Privacy Guard | 2.0 | All | All | All |
| Application | Gnu | Privacy Guard | 2.0.1 | All | All | All |
| Application | Gnu | Privacy Guard | 1.2.4 | All | All | All |
| Application | Gnu | Privacy Guard | 1.2.5 | All | All | All |
| Application | Gnu | Privacy Guard | 1.2.6 | All | All | All |
| Application | Gnu | Privacy Guard | 1.2.7 | All | All | All |
| Application | Gnu | Privacy Guard | 1.3.3 | All | All | All |
| Application | Gnu | Privacy Guard | 1.3.4 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.1 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.2 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.2.1 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.2.2 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.3 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.4 | All | All | All |
| Application | Gnu | Privacy Guard | 1.4.5 | All | All | All |
| Application | Gnu | Privacy Guard | 1.9.10 | All | All | All |
| Application | Gnu | Privacy Guard | 1.9.15 | All | All | All |
| Application | Gnu | Privacy Guard | 1.9.20 | All | All | All |
| Application | Gnu | Privacy Guard | 2.0 | All | All | All |
| Application | Gnu | Privacy Guard | 2.0.1 | All | All | All |
| Application | Gpg4win | Gpg4win | 1.0.7 | All | All | All |
| Application | Gpg4win | Gpg4win | 1.0.7 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 4.0 | All | advanced_server | All |
| Operating System | Redhat | Enterprise Linux | 4.0 | All | enterprise_server | All |
| Operating System | Redhat | Enterprise Linux | 4.0 | All | workstation | All |
| Operating System | Redhat | Enterprise Linux | 4.0 | All | advanced_server | All |
| Operating System | Redhat | Enterprise Linux | 4.0 | All | enterprise_server | All |
| Operating System | Redhat | Enterprise Linux | 4.0 | All | workstation | All |
| Operating System | Redhat | Enterprise Linux Desktop | 3.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 4.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 3.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 4.0 | All | All | All |
| Operating System | Redhat | Fedora Core | core6 | All | All | All |
| Operating System | Redhat | Fedora Core | core_5.0 | All | All | All |
| Operating System | Redhat | Fedora Core | core6 | All | All | All |
| Operating System | Redhat | Fedora Core | core_5.0 | All | All | All |
| Operating System | Redhat | Linux Advanced Workstation | 2.1 | All | itanium_processor | All |
| Operating System | Redhat | Linux Advanced Workstation | 2.1 | All | itanium_processor | All |
| Operating System | Rpath | Linux | 1 | All | All | All |
| Operating System | Rpath | Linux | 1 | All | All | All |
| Operating System | Slackware | Slackware Linux | 11.0 | All | All | All |
| Operating System | Slackware | Slackware Linux | 11.0 | All | All | All |
| Operating System | Ubuntu | Ubuntu Linux | 5.10 | All | All | All |
| Operating System | Ubuntu | Ubuntu Linux | 6.06 | All | All | All |
| Operating System | Ubuntu | Ubuntu Linux | 5.10 | All | All | All |
| Operating System | Ubuntu | Ubuntu Linux | 6.06 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| US-CERT Vulnerability Note VU#427009 | CERT-VN | www.kb.cert.org | US Government Resource |
| Avaya Products GnuPG Multiple Vulnerabilities - Advisories - Secunia | SECUNIA | secunia.com | |
| USN-393-2: GnuPG2 vulnerabilities | Ubuntu | UBUNTU | www.ubuntu.com | |
| OpenPKG Corporation: Security: Security Advisories | OPENPKG | www.openpkg.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Mandriva update for gnupg - Advisories - Secunia | SECUNIA | secunia.com | |
| Debian -- Security Information -- DSA-1231-1 gnupg | DEBIAN | www.debian.org | |
| USN-393-1: GnuPG vulnerability | Ubuntu | UBUNTU | www.ubuntu.com | Patch |
| 404 Not Found | MLIST | lists.gnupg.org | |
| Webmail - OVH | VUPEN | www.vupen.com | |
| SuSE Security announcements: [suse-security-announce] SUSE Security Announcement: gpg (SUSE-SA:2006:075) | SUSE | lists.suse.com | |
| GnuPG OpenPGP Message Decryption Vulnerability - Advisories - Secunia | SECUNIA | secunia.com | Patch, Vendor Advisory |
| GnuPG OpenPGP Packet Processing Function Pointer Overwrite Vulnerability | BID | www.securityfocus.com | Vendor Advisory |
| rPath update for gnupg - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| 20061201-01-P | SGI | patches.sgi.com | |
| GnuPG OpenPGP Packet Stack Overflow Lets Remote Users Execute Arbitrary Code - SecurityTracker | SECTRACK | securitytracker.com | |
| Slackware update for gnupg - Advisories - Secunia | SECUNIA | secunia.com | Patch, Vendor Advisory |
| rhn.redhat.com | Red Hat Support | REDHAT | www.redhat.com | Vendor Advisory |
| Gentoo Linux Documentation -- GnuPG: Multiple vulnerabilities | GENTOO | security.gentoo.org | |
| Trustix update for gnupg and proftpd - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| SUSE Update for Multiple Packages - Advisories - Secunia | SECUNIA | secunia.com | |
| ASA-2007-047 (RHSA-2006-0754) | CONFIRM | support.avaya.com | |
| Debian update for gnupg - Advisories - Secunia | SECUNIA | secunia.com | |
| Security Announcement | SUSE | www.novell.com | |
| Support / Security / Advisories / / MDKSA-2006:228 | Mandriva | MANDRIVA | www.mandriva.com | |
| SGI Advanced Linux Environment Multiple Updates - Advisories - Secunia | SECUNIA | secunia.com | |
| Ubuntu update for gnupg - Advisories - Secunia | SECUNIA | secunia.com | Patch, Vendor Advisory |
| Red Hat update for gnupg - Advisories - Secunia | SECUNIA | secunia.com | Patch, Vendor Advisory |
| SUSE update for gnupg - Advisories - Secunia | SECUNIA | secunia.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| Gentoo update for gnupg - Advisories - Secunia | SECUNIA | secunia.com | |
| issues.rpath.com/browse/RPL-835 | CONFIRM | issues.rpath.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| 2006-0070 | TRUSTIX | www.trustix.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2007-03-14 | Mark J Cox | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. |
There are currently no legacy QID mappings associated with this CVE.