Your submission was sent successfully! Close

CVE-2006-6169

Published: 29 November 2006

Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.

Priority

Unknown

Status

Package Release Status
gnupg
Launchpad, Ubuntu, Debian
Upstream
Released (1.4.7)
gnupg2
Launchpad, Ubuntu, Debian
Upstream
Released (2.0.0)