lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 7 Dec 2006 23:22:34 +0100
From: OpenPKG GmbH <openpkg-noreply@...npkg.com>
To: bugtraq@...urityfocus.com
Subject: [OpenPKG-SA-2006.037] OpenPKG Security Advisory (gnupg)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

____________________________________________________________________________

Publisher Name:          OpenPKG GmbH
Publisher Home:          http://openpkg.com/

Advisory Id (public):    OpenPKG-SA-2006.037
Advisory Type:           OpenPKG Security Advisory (SA)
Advisory Directory:      http://openpkg.com/go/OpenPKG-SA
Advisory Document:       http://openpkg.com/go/OpenPKG-SA-2006.037
Advisory Published:      2006-12-07 23:21 UTC

Issue Id (internal):     OpenPKG-SI-20061128.01
Issue First Created:     2006-11-28
Issue Last Modified:     2006-12-07
Issue Revision:          12
____________________________________________________________________________

Subject Name:            GnuPG
Subject Summary:         OpenPGP cryptography tool
Subject Home:            http://www.gnupg.org/
Subject Versions:        1.* <= 1.4.5 && 2.* <= 2.0.1

Vulnerability Id:        CVE-2006-6169, CVE-2006-6235
Vulnerability Scope:     global (not OpenPKG specific)

Attack Feasibility:      run-time
Attack Vector:           remote network
Attack Impact:           denial of service, arbitrary code execution

Description:
    Two security issues were discovered in the OpenPGP cryptography
    tool GnuPG [0], versions up to and including 1.4.5 and 2.0.1.
    
    The first issue [1] is a heap-based buffer overflow which has been
    identified by the vendor during fixing a bug reported by Hugh
    Warrington [2]. The problem is that the GnuPG internal function
    make_printable_string() is supposed to replace possible dangerous
    characters from a prompt and returns an allocated string. This
    string may be longer than the original one, but the buffer for the
    prompt is only be allocated at the size of the original string. The
    flaw might allow attackers to cause a denial of service or even
    execute arbitrary code via messages with "C-escape" expansions.
    
    The second issue [3] is a memory management problem. GnuPG uses
    data structures called filters to process OpenPGP messages. For
    communication between filters, context structures are used. These
    are usually allocated on the stack and passed to the filter
    functions. At most places the OpenPGP data stream fed into these
    filters is closed before the context structure gets deallocated.
    While decrypting encrypted packets, this may not happen in all
    cases and the filter may use a void context structure filled with
    garbage. An attacker may control this garbage. The filter context
    includes another context used by the low-level decryption to access
    the decryption algorithm. This is done using a function pointer.
    By carefully crafting an OpenPGP message, an attacker may control
    this function pointer and call an arbitrary function of the process.
    This is a remotely exploitable bug and affects any use of GnuPG
    where an attacker can control the data processed by GnuPG. It is
    not necessary limited to encrypted data, also signed data may be
    affected.

References:
    [0] http://www.gnupg.org/
    [1] http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html
    [2] https://bugs.g10code.com/gnupg/issue728
    [3] http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000246.html
____________________________________________________________________________

Primary Package Name:    gnupg
Primary Package Home:    http://openpkg.org/go/package/gnupg

Corrected Distribution:  Corrected Series: Corrected Package:
OpenPKG Enterprise       E1.0-SOLID        gnupg-1.4.5-E1.0.1
OpenPKG Community        2-STABLE-20061018 gnupg-1.4.6-2.20061207
OpenPKG Community        2-STABLE          gnupg-1.4.6-2.20061207
OpenPKG Community        CURRENT           gnupg-1.4.6-20061206
OpenPKG Community        CURRENT           gnupg2-2.0.1-20061207
____________________________________________________________________________

For security reasons, this document was digitally signed with the
OpenPGP public key of the OpenPKG GmbH (public key id 61B7AE34)
which you can download from http://openpkg.com/openpkg.com.pgp
or retrieve from the OpenPGP keyserver at hkp://pgp.openpkg.org/.
Follow the instructions at http://openpkg.com/security/signatures/
for more details on how to verify the integrity of this document.
____________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Comment: OpenPKG GmbH <http://openpkg.com/>

iD8DBQFFeJP+ZwQuyWG3rjQRAqGRAKCv3mjhWlsMh/BDigHi05uaqwwvoQCfU3lV
brJFA0qntdpcwgqBYvQ28xQ=
=4wZZ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ