Total vulnerabilities in the database
Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.
Software | From | Fixed in |
---|---|---|
gnupg / gnupg | 2.0 | 2.0.x |
gnupg / gnupg | 1.4 | 1.4.x |