FreeBSD : gnupg -- buffer overflow (34c93ae8-7e6f-11db-bf00-02e081235dab)
High Nessus Plugin ID 23738
SynopsisThe remote FreeBSD host is missing a security-related update.
DescriptionWerner Koch reports :
When running GnuPG interactively, special crafted messages may be used to crash gpg or gpg2. Running gpg in batch mode, as done by all software using gpg as a backend (e.g. mailers), is not affected by this bug.
Exploiting this overflow seems to be possible.
gpg-agent, gpgsm, gpgv or other tools from the GnuPG suite are not affected.
SolutionUpdate the affected package.