GnuPG Make_Printable_String Remote Buffer Overflow Vulnerability
BID:21306
Info
GnuPG Make_Printable_String Remote Buffer Overflow Vulnerability
| Bugtraq ID: | 21306 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2006-6169 |
| Remote: | Yes |
| Local: | No |
| Published: | Nov 27 2006 12:00AM |
| Updated: | Mar 19 2015 09:09AM |
| Credit: | This issue was disclosed by the vendor. |
| Vulnerable: |
Ubuntu Ubuntu Linux 5.10 sparc Ubuntu Ubuntu Linux 5.10 powerpc Ubuntu Ubuntu Linux 5.10 i386 Ubuntu Ubuntu Linux 5.10 amd64 Ubuntu Ubuntu Linux 6.10 sparc Ubuntu Ubuntu Linux 6.10 powerpc Ubuntu Ubuntu Linux 6.10 i386 Ubuntu Ubuntu Linux 6.10 amd64 Ubuntu Ubuntu Linux 6.06 LTS sparc Ubuntu Ubuntu Linux 6.06 LTS powerpc Ubuntu Ubuntu Linux 6.06 LTS i386 Ubuntu Ubuntu Linux 6.06 LTS amd64 Trustix Secure Linux 3.0 Trustix Secure Linux 2.2 Trustix Operating System Enterprise Server 2.0 SuSE SUSE Linux Enterprise Server 8 SuSE SUSE Linux Enterprise Server 10 SuSE SUSE Linux Enterprise Desktop 10 Slackware Linux 10.2 Slackware Linux 10.1 Slackware Linux 10.0 Slackware Linux 9.1 Slackware Linux 9.0 Slackware Linux 11.0 SGI Advanced Linux Environment 3.0 S.u.S.E. UnitedLinux 1.0 S.u.S.E. SuSE Linux Standard Server 8.0 S.u.S.E. SuSE Linux School Server for i386 S.u.S.E. SUSE LINUX Retail Solution 8.0 S.u.S.E. SuSE Linux Openexchange Server 4.0 S.u.S.E. Open-Enterprise-Server 9.0 S.u.S.E. Novell Linux POS 9 S.u.S.E. Novell Linux Desktop 9.0 S.u.S.E. Linux Professional 10.0 OSS S.u.S.E. Linux Professional 9.3 x86_64 S.u.S.E. Linux Professional 9.3 S.u.S.E. Linux Professional 10.1 S.u.S.E. Linux Personal 10.0 OSS S.u.S.E. Linux Personal 9.3 x86_64 S.u.S.E. Linux Personal 9.3 S.u.S.E. Linux Personal 10.1 S.u.S.E. Linux Desktop 1.0 rPath rPath Linux 1 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux WS 3 RedHat Enterprise Linux WS 2.1 IA64 RedHat Enterprise Linux WS 2.1 RedHat Enterprise Linux ES 4 RedHat Enterprise Linux ES 3 RedHat Enterprise Linux ES 2.1 IA64 RedHat Enterprise Linux ES 2.1 RedHat Desktop 4.0 RedHat Desktop 3.0 RedHat Advanced Workstation for the Itanium Processor 2.1 IA64 RedHat Advanced Workstation for the Itanium Processor 2.1 Red Hat Fedora Core6 Red Hat Fedora Core5 Red Hat Enterprise Linux AS 4 Red Hat Enterprise Linux AS 3 Red Hat Enterprise Linux AS 2.1 IA64 Red Hat Enterprise Linux AS 2.1 OpenPKG OpenPKG Stable OpenPKG OpenPKG E1.0-Solid OpenPKG OpenPKG Current OpenPKG OpenPKG 2-Stable-20061018 Mandriva Linux Mandrake 2006.0 x86_64 Mandriva Linux Mandrake 2006.0 Mandriva Linux Mandrake 2007.0 x86_64 Mandriva Linux Mandrake 2007.0 MandrakeSoft Multi Network Firewall 2.0 MandrakeSoft Corporate Server 4.0 x86_64 MandrakeSoft Corporate Server 3.0 x86_64 MandrakeSoft Corporate Server 3.0 MandrakeSoft Corporate Server 4.0 IPCop IPCop 1.4.12 IPCop IPCop 1.4.11 IPCop IPCop 1.4.10 GNU GNU Privacy Guard 2.0 GNU GNU Privacy Guard 1.4.5 GNU GNU Privacy Guard 1.4.4 GNU GNU Privacy Guard 1.4.3 GNU GNU Privacy Guard 1.4.2 2 GNU GNU Privacy Guard 1.4.2 .1 GNU GNU Privacy Guard 1.4.2 GNU GNU Privacy Guard 1.4.1 GNU GNU Privacy Guard 1.4 Gentoo Linux Debian Linux 3.1 sparc Debian Linux 3.1 s/390 Debian Linux 3.1 ppc Debian Linux 3.1 mipsel Debian Linux 3.1 mips Debian Linux 3.1 m68k Debian Linux 3.1 ia-64 Debian Linux 3.1 ia-32 Debian Linux 3.1 hppa Debian Linux 3.1 arm Debian Linux 3.1 amd64 Debian Linux 3.1 alpha Debian Linux 3.1 Avaya SES 2.0 Avaya S8710 CM 3.1 Avaya S8710 CM 2.0 Avaya S8700 CM 3.1 Avaya S8700 CM 2.0 Avaya S8500 CM 3.1 Avaya S8500 CM 2.0 Avaya S8300 CM 3.1 Avaya S8300 CM 2.0 Avaya Messaging Storage Server Avaya Message Networking Avaya Intuity LX Avaya EMMC 0 Avaya CCS 3.0 Avaya CCS 2.0 Avaya Aura SIP Enablement Services 3.0 |
| Not Vulnerable: |
IPCop IPCop 1.4.13 |
Discussion
GnuPG Make_Printable_String Remote Buffer Overflow Vulnerability
GnuPG is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.
Exploiting this issue may allow remote attackers to execute arbitrary machine code in the context of the affected application, but this has not been confirmed.
GnuPG versions 1.4.5 and 2.0.0 are vulnerable to this issue; previous versions may also be affected.
GnuPG is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.
Exploiting this issue may allow remote attackers to execute arbitrary machine code in the context of the affected application, but this has not been confirmed.
GnuPG versions 1.4.5 and 2.0.0 are vulnerable to this issue; previous versions may also be affected.
Exploit / POC
GnuPG Make_Printable_String Remote Buffer Overflow Vulnerability
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
GnuPG Make_Printable_String Remote Buffer Overflow Vulnerability
Solution:
The vendor has released a patch to address this issue. Please see the references for more information.
GNU GNU Privacy Guard 1.4
IPCop IPCop 1.4.10
IPCop IPCop 1.4.11
IPCop IPCop 1.4.12
GNU GNU Privacy Guard 1.4.5
Solution:
The vendor has released a patch to address this issue. Please see the references for more information.
GNU GNU Privacy Guard 1.4
-
SuSE gpg-1.4.0-4.11.i586.rpm
SUSE LINUX 9.3:
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/gpg-1.4.0-4.11.i5 86.rpm -
SuSE gpg-1.4.0-4.11.x86_64.rpm
SUSE LINUX 9.3:
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/gpg-1.4.0-4.11. x86_64.rpm
IPCop IPCop 1.4.10
-
IPCop IPCop 1.4.13
http://www.ipcop.org/modules.php?op=modload&name=Downloads&file=index& POSTNUKESID=961e0cc5ccfe96980893c48dc5387e87
IPCop IPCop 1.4.11
-
IPCop IPCop 1.4.13
http://www.ipcop.org/modules.php?op=modload&name=Downloads&file=index& POSTNUKESID=961e0cc5ccfe96980893c48dc5387e87
IPCop IPCop 1.4.12
-
IPCop IPCop 1.4.13
http://www.ipcop.org/modules.php?op=modload&name=Downloads&file=index& POSTNUKESID=961e0cc5ccfe96980893c48dc5387e87
GNU GNU Privacy Guard 1.4.5
-
RedHat Fedora gnupg-1.4.7-2.ppc.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat Fedora gnupg-1.4.7-2.x86_64.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat Fedora gnupg-debuginfo-1.4.7-2.i386.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat Fedora gnupg-debuginfo-1.4.7-2.ppc.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
RedHat Fedora gnupg-debuginfo-1.4.7-2.x86_64.rpm
Fedora Core 6
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ -
SuSE gpg-1.4.2-23.12.i586.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/gpg-1.4.2-23.12.i586. rpm -
SuSE gpg-1.4.5-24.2.i586.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/gpg-1.4.5-24.2.i586.r pm -
SuSE gpg-1.4.5-24.2.ppc.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/gpg-1.4.5-24.2.ppc.rpm -
SuSE gpg-1.4.5-24.2.x86_64.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/gpg-1.4.5-24.2.x86_ 64.rpm -
SuSE gpg2-1.9.22-20.2.i586.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/gpg2-1.9.22-20.2.i586 .rpm