Show filters
34 Total Results
Displaying 1-10 of 34
Sort by:
Attacker Value
Unknown

CVE-2022-3219

Disclosure Date: February 23, 2023 (last updated October 08, 2023)
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
Attacker Value
Unknown

CVE-2022-3515

Disclosure Date: January 12, 2023 (last updated October 08, 2023)
A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.
Attacker Value
Unknown

CVE-2022-34903

Disclosure Date: July 01, 2022 (last updated October 07, 2023)
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
Attacker Value
Unknown

CVE-2020-25125

Disclosure Date: September 03, 2020 (last updated November 28, 2024)
GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version.
Attacker Value
Unknown

CVE-2019-14855

Disclosure Date: March 20, 2020 (last updated November 27, 2024)
A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
Attacker Value
Unknown

CVE-2014-3591

Disclosure Date: November 29, 2019 (last updated November 27, 2024)
Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.
Attacker Value
Unknown

CVE-2015-0837

Disclosure Date: November 29, 2019 (last updated November 27, 2024)
The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."
Attacker Value
Unknown

CVE-2011-2207

Disclosure Date: November 27, 2019 (last updated November 27, 2024)
dirmngr before 2.1.0 improperly handles certain system calls, which allows remote attackers to cause a denial of service (DOS) via a specially-crafted certificate.
Attacker Value
Unknown

CVE-2015-1607

Disclosure Date: November 20, 2019 (last updated November 08, 2023)
kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extensions and "memcpy with overlapping ranges."
Attacker Value
Unknown

CVE-2015-1606

Disclosure Date: November 20, 2019 (last updated November 08, 2023)
The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.