Heap-based Buffer Overflow Affecting gpgme package, versions *
Snyk CVSS
Attack Complexity
High
Threat Intelligence
EPSS
3.57% (92nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-GPGME-1941077
- published 26 Jul 2021
- disclosed 30 Jul 2014
Introduced: 30 Jul 2014
CVE-2014-3564 Open this link in a new tabHow to fix?
There is no fixed version for Centos:7
gpgme
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream gpgme
package and not the gpgme
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
References
- http://www.securityfocus.com/bid/68990
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
- https://bugzilla.redhat.com/show_bug.cgi?id=1113267
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- https://access.redhat.com/security/cve/CVE-2014-3564
- http://www.debian.org/security/2014/dsa-3005
- http://seclists.org/oss-sec/2014/q3/266
- http://www.osvdb.org/109699
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git%3Ba=commit%3Bh=2cbd76f7911fc215845e89b50d6af5ff4a83dd77