FreeBSD : gnupg -- buffer overflow (34c93ae8-7e6f-11db-bf00-02e081235dab)

high Nessus Plugin ID 23738

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Werner Koch reports :

When running GnuPG interactively, special crafted messages may be used to crash gpg or gpg2. Running gpg in batch mode, as done by all software using gpg as a backend (e.g. mailers), is not affected by this bug.

Exploiting this overflow seems to be possible.

gpg-agent, gpgsm, gpgv or other tools from the GnuPG suite are not affected.

Solution

Update the affected package.

See Also

https://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html

http://www.nessus.org/u?eba0304b

Plugin Details

Severity: High

ID: 23738

File Name: freebsd_pkg_34c93ae87e6f11dbbf0002e081235dab.nasl

Version: 1.13

Type: local

Published: 11/28/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:gnupg, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 11/27/2006

Vulnerability Publication Date: 11/27/2006