GnuPG CVE-2012-6085 Multiple Remote Memory Corruption Vulnerabilities

GnuPG is prone to multiple remote memory-corruption vulnerabilities because it fails to validate public keys.

An attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application and to corrupt the database. Failed exploit attempts will likely result in denial-of-service conditions.

Versions prior to GnuPG 1.4.13 are vulnerable.


 

Privacy Statement
Copyright 2010, SecurityFocus