what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

OpenPKG Security Advisory 2006.37

OpenPKG Security Advisory 2006.37
Posted Dec 8, 2006
Authored by OpenPKG Foundation | Site openpkg.org

OpenPKG Security Advisory OpenPKG-SA-2006.037 - Two security issues were discovered in the OpenPGP cryptography tool GnuPG, versions up to and including 1.4.5 and 2.0.1. The first issue is a heap-based buffer overflow which has been identified by the vendor during fixing a bug reported by Hugh Warrington. The second issue is a memory management problem.

tags | advisory, overflow
advisories | CVE-2006-6169, CVE-2006-6235
SHA-256 | e2ad975972bd8b4d3c70e676abce3b1376c3b1ef57af266813f375814ebfe63c

OpenPKG Security Advisory 2006.37

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

____________________________________________________________________________

Publisher Name: OpenPKG GmbH
Publisher Home: https://openpkg.com/

Advisory Id (public): OpenPKG-SA-2006.037
Advisory Type: OpenPKG Security Advisory (SA)
Advisory Directory: https://openpkg.com/go/OpenPKG-SA
Advisory Document: https://openpkg.com/go/OpenPKG-SA-2006.037
Advisory Published: 2006-12-07 23:21 UTC

Issue Id (internal): OpenPKG-SI-20061128.01
Issue First Created: 2006-11-28
Issue Last Modified: 2006-12-07
Issue Revision: 12
____________________________________________________________________________

Subject Name: GnuPG
Subject Summary: OpenPGP cryptography tool
Subject Home: https://www.gnupg.org/
Subject Versions: 1.* <= 1.4.5 && 2.* <= 2.0.1

Vulnerability Id: CVE-2006-6169, CVE-2006-6235
Vulnerability Scope: global (not OpenPKG specific)

Attack Feasibility: run-time
Attack Vector: remote network
Attack Impact: denial of service, arbitrary code execution

Description:
Two security issues were discovered in the OpenPGP cryptography
tool GnuPG [0], versions up to and including 1.4.5 and 2.0.1.

The first issue [1] is a heap-based buffer overflow which has been
identified by the vendor during fixing a bug reported by Hugh
Warrington [2]. The problem is that the GnuPG internal function
make_printable_string() is supposed to replace possible dangerous
characters from a prompt and returns an allocated string. This
string may be longer than the original one, but the buffer for the
prompt is only be allocated at the size of the original string. The
flaw might allow attackers to cause a denial of service or even
execute arbitrary code via messages with "C-escape" expansions.

The second issue [3] is a memory management problem. GnuPG uses
data structures called filters to process OpenPGP messages. For
communication between filters, context structures are used. These
are usually allocated on the stack and passed to the filter
functions. At most places the OpenPGP data stream fed into these
filters is closed before the context structure gets deallocated.
While decrypting encrypted packets, this may not happen in all
cases and the filter may use a void context structure filled with
garbage. An attacker may control this garbage. The filter context
includes another context used by the low-level decryption to access
the decryption algorithm. This is done using a function pointer.
By carefully crafting an OpenPGP message, an attacker may control
this function pointer and call an arbitrary function of the process.
This is a remotely exploitable bug and affects any use of GnuPG
where an attacker can control the data processed by GnuPG. It is
not necessary limited to encrypted data, also signed data may be
affected.

References:
[0] https://www.gnupg.org/
[1] https://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html
[2] https://bugs.g10code.com/gnupg/issue728
[3] https://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000246.html
____________________________________________________________________________

Primary Package Name: gnupg
Primary Package Home: https://openpkg.org/go/package/gnupg

Corrected Distribution: Corrected Series: Corrected Package:
OpenPKG Enterprise E1.0-SOLID gnupg-1.4.5-E1.0.1
OpenPKG Community 2-STABLE-20061018 gnupg-1.4.6-2.20061207
OpenPKG Community 2-STABLE gnupg-1.4.6-2.20061207
OpenPKG Community CURRENT gnupg-1.4.6-20061206
OpenPKG Community CURRENT gnupg2-2.0.1-20061207
____________________________________________________________________________

For security reasons, this document was digitally signed with the
OpenPGP public key of the OpenPKG GmbH (public key id 61B7AE34)
which you can download from https://openpkg.com/openpkg.com.pgp
or retrieve from the OpenPGP keyserver at hkp://pgp.openpkg.org/.
Follow the instructions at https://openpkg.com/security/signatures/
for more details on how to verify the integrity of this document.
____________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Comment: OpenPKG GmbH <https://openpkg.com/>

iD8DBQFFeJP+ZwQuyWG3rjQRAqGRAKCv3mjhWlsMh/BDigHi05uaqwwvoQCfU3lV
brJFA0qntdpcwgqBYvQ28xQ=
=4wZZ
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close