Mandrake Linux Security Advisory : gnupg (MDKSA-2006:141)

medium Nessus Plugin ID 23890

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

An integer overflow vulnerability was discovered in gnupg where an attacker could create a carefully-crafted message packet with a large length that could cause gnupg to crash or possibly overwrite memory when opened.

Updated packages have been patched to correct this issue.

Solution

Update the affected gnupg and / or gnupg2 packages.

Plugin Details

Severity: Medium

ID: 23890

File Name: mandrake_MDKSA-2006-141.nasl

Version: 1.17

Type: local

Published: 12/16/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:gnupg, p-cpe:/a:mandriva:linux:gnupg2, cpe:/o:mandriva:linux:2006

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/14/2006

Reference Information

CVE: CVE-2006-3746

BID: 19110

MDKSA: 2006:141