Vulnerability Name:

CVE-2006-3082 (CCN-27245)

Assigned:2006-05-31
Published:2006-05-31
Updated:2018-10-18
Summary:parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-189
Vulnerability Consequences:Gain Access
References:Source: SGI
Type: UNKNOWN
20060701-01-U

Source: MITRE
Type: CNA
CVE-2006-3082

Source: CONFIRM
Type: UNKNOWN
http://cvs.gnupg.org/cgi-bin/viewcvs.cgi/trunk/g10/parse-packet.c?rev=4157&r1=4141&r2=4157

Source: CCN
Type: GnuPG CVS Repository
GnuPG: trunk/g10/parse-packet.c

Source: CCN
Type: RHSA-2006-0571
gnupg security update

Source: FULLDISC
Type: UNKNOWN
20060531 GnuPG fun

Source: FULLDISC
Type: UNKNOWN
20060531 RE: GnuPG fun

Source: FULLDISC
Type: UNKNOWN
20060601 Re: GnuPG fun

Source: CCN
Type: SA20783
GnuPG "parse-packet.c" Denial of Service Vulnerability

Source: SECUNIA
Type: Vendor Advisory
20783

Source: SECUNIA
Type: Vendor Advisory
20801

Source: SECUNIA
Type: Vendor Advisory
20811

Source: SECUNIA
Type: Vendor Advisory
20829

Source: SECUNIA
Type: Vendor Advisory
20881

Source: SECUNIA
Type: Vendor Advisory
20899

Source: SECUNIA
Type: Vendor Advisory
20968

Source: SECUNIA
Type: Vendor Advisory
21063

Source: SECUNIA
Type: Vendor Advisory
21135

Source: SECUNIA
Type: Vendor Advisory
21137

Source: SECUNIA
Type: Vendor Advisory
21143

Source: CCN
Type: SA21585
Avaya Products GnuPG Denial of Service Vulnerability

Source: SECUNIA
Type: Vendor Advisory
21585

Source: CCN
Type: SECTRACK ID: 1016519
GnuPG Integer Overflow in Processing User ID Values May Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1016519

Source: SLACKWARE
Type: UNKNOWN
SSA:2006-178-02

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2006-167.htm

Source: CCN
Type: ASA-2006-167
gnupg security update (RHSA-2006-0571)

Source: DEBIAN
Type: UNKNOWN
DSA-1107

Source: DEBIAN
Type: UNKNOWN
DSA-1115

Source: DEBIAN
Type: DSA-1107
gnupg -- integer overflow

Source: DEBIAN
Type: DSA-1115
gnupg2 -- integer overflow

Source: CCN
Type: GnuPG.org
Download

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:110

Source: SUSE
Type: UNKNOWN
SUSE-SR:2006:018

Source: SUSE
Type: UNKNOWN
SUSE-SR:2006:015

Source: CCN
Type: OpenPKG-SA-2006.010
GNUPG

Source: OPENPKG
Type: UNKNOWN
OpenPKG-SA-2006.010

Source: REDHAT
Type: UNKNOWN
RHSA-2006:0571

Source: BUGTRAQ
Type: UNKNOWN
20060629 rPSA-2006-0120-1 gnupg

Source: BID
Type: Vendor Advisory
18554

Source: CCN
Type: BID-18554
GnuPG Parse_User_ID Remote Buffer Overflow Vulnerability

Source: CCN
Type: USN-304-1
GnuPG vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2006-2450

Source: XF
Type: UNKNOWN
gnupg-parsepacket-bo(27245)

Source: XF
Type: UNKNOWN
gnupg-parsepacket-bo(27245)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10089

Source: UBUNTU
Type: UNKNOWN
USN-304-1

Source: SUSE
Type: SUSE-SR:2006:015
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2006:018
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnupg:gnupg:*:*:*:*:*:*:*:* (Version <= 1.9.20)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnu:privacy_guard:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.4.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.4.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.9.10:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.9.15:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:privacy_guard:1.9.20:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.5:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20063082
    V
    CVE-2006-3082
    2015-11-16
    oval:org.mitre.oval:def:10089
    V
    parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.
    2013-04-29
    oval:org.debian:def:1115
    V
    integer overflow
    2006-07-21
    oval:com.redhat.rhsa:def:20060571
    P
    RHSA-2006:0571: gnupg security update (Moderate)
    2006-07-18
    oval:org.debian:def:1107
    V
    integer overflow
    2006-07-10
    BACK
    gnupg gnupg 1.4.3
    gnupg gnupg *
    gnu privacy guard 1.0
    gnu privacy guard 1.0.1
    gnu privacy guard 1.0.2
    gnu privacy guard 1.0.3
    gnu privacy guard 1.0.4
    gnu privacy guard 1.0.5
    gnu privacy guard 1.2.3
    gnu privacy guard 1.3.3
    gnu privacy guard 1.0.6
    gnu privacy guard 1.0.7
    gnu privacy guard 1.2
    gnu privacy guard 1.2.1
    gnu privacy guard 1.2.2
    gnu privacy guard 1.2.4
    gnu privacy guard 1.2.5
    gnu privacy guard 1.2.6
    gnu privacy guard 1.2.7
    gnu privacy guard 1.3.4
    gnu privacy guard 1.4
    gnu privacy guard 1.4.1
    gnu privacy guard 1.4.2
    gnu privacy guard 1.4.2.1
    gnu privacy guard 1.4.2.2
    gnu privacy guard 1.4.3
    gnu privacy guard 1.9.10
    gnu privacy guard 1.9.15
    gnu privacy guard 1.9.20
    debian debian linux 3.0
    openpkg openpkg current
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    mandrakesoft mandrake multi network firewall 2.0
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 2006
    openpkg openpkg 2.5
    canonical ubuntu 6.06
    mandrakesoft mandrake linux 2006
    mandrakesoft mandrake linux corporate server 3.0