CVE-2006-3746 Affecting gnupg2 package, versions <1.9.20-2
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
89.6% (99th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-GNUPG2-340484
- published 28 Jul 2006
- disclosed 28 Jul 2006
Introduced: 28 Jul 2006
CVE-2006-3746 Open this link in a new tabHow to fix?
Upgrade Debian:10
gnupg2
to version 1.9.20-2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2
package and not the gnupg2
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.
References
- https://security-tracker.debian.org/tracker/CVE-2006-3746
- http://www.securityfocus.com/archive/1/442012/100/0/threaded
- http://www.securityfocus.com/archive/1/442621/100/100/threaded
- http://support.avaya.com/elmodocs2/security/ASA-2006-164.htm
- http://bugs.debian.org/cgi-bin/bugreport.cgi/gnupg.CVE-2006-3746.diff?bug=381204;msg=15;att=1
- http://www.debian.org/security/2006/dsa-1140
- http://www.debian.org/security/2006/dsa-1141
- http://security.gentoo.org/glsa/glsa-200608-08.xml
- http://issues.rpath.com/browse/RPL-560
- http://lists.immunitysec.com/pipermail/dailydave/2006-July/003354.html
- http://www.gossamer-threads.com/lists/gnupg/devel/37623
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11347
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=200502
- http://securitytracker.com/id?1016622
- http://secunia.com/advisories/21297
- http://secunia.com/advisories/21300
- http://secunia.com/advisories/21306
- http://secunia.com/advisories/21326
- http://secunia.com/advisories/21329
- http://secunia.com/advisories/21333
- http://secunia.com/advisories/21346
- http://secunia.com/advisories/21351
- http://secunia.com/advisories/21378
- http://secunia.com/advisories/21467
- http://secunia.com/advisories/21522
- http://secunia.com/advisories/21524
- http://secunia.com/advisories/21598
- http://www.securityfocus.com/bid/19110
- ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P
- http://www.novell.com/linux/security/advisories/2006_20_sr.html
- http://lwn.net/Alerts/194228/
- http://www.ubuntu.com/usn/usn-332-1
- http://www.vupen.com/english/advisories/2006/3123
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28220
- http://www.redhat.com/support/errata/RHSA-2006-0615.html
- http://www.osvdb.org/27664
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:141
- http://bugs.debian.org/cgi-bin/bugreport.cgi/gnupg.CVE-2006-3746.diff?bug=381204%3Bmsg=15%3Batt=1