This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200608-08
(GnuPG: Integer overflow vulnerability)
Evgeny Legerov discovered a vulnerability in GnuPG that when certain
packets are handled an integer overflow may occur.
By sending a specially crafted email to a user running an affected
version of GnuPG, a remote attacker could possibly execute arbitrary
code with the permissions of the user running GnuPG.
There is no known workaround at this time.
See also :
All GnuPG users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '=app-crypt/gnupg-1.4*'
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 3.9
Public Exploit Available : true
Family: Gentoo Local Security Checks
Nessus Plugin ID: 22166 (gentoo_GLSA-200608-08.nasl)
Bugtraq ID: 19110
CVE ID: CVE-2006-3746
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.