Upstream information

CVE-2006-6169 at MITRE

Description

Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 224108 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 11 SP1
  • gpg2 >= 2.0.9-25.25.1
  • gpg2-lang >= 2.0.9-25.25.1
Patchnames:
SUSE Linux Enterprise Server 11 SP1 GA gpg2-2.0.9-25.25.1
SUSE Linux Enterprise Server 11 SP2
  • gpg2 >= 2.0.9-25.33.27.1
  • gpg2-lang >= 2.0.9-25.33.27.1
Patchnames:
SUSE Linux Enterprise Server 11 SP2 GA gpg2-2.0.9-25.33.27.1
SUSE Linux Enterprise Server 11 SP3
  • gpg2 >= 2.0.9-25.33.31.1
  • gpg2-lang >= 2.0.9-25.33.31.1
Patchnames:
SUSE Linux Enterprise Server 11 SP3 GA gpg2-2.0.9-25.33.31.1
SUSE Linux Enterprise Server 11 SP4
  • gpg2 >= 2.0.9-25.33.39.1
  • gpg2-lang >= 2.0.9-25.33.39.1
Patchnames:
SUSE Linux Enterprise Server 11 SP4 GA gpg2-2.0.9-25.33.39.1
openSUSE Tumbleweed
  • dirmngr >= 2.2.27-2.4
  • gpg2 >= 2.2.27-2.4
  • gpg2-lang >= 2.2.27-2.4
Patchnames:
openSUSE Tumbleweed GA dirmngr-2.2.27-2.4


SUSE Timeline for this CVE

CVE page created: Fri Jun 28 05:18:22 2013
CVE page last modified: Fri Dec 8 16:18:42 2023