CVE-2014-9087

Published: 26 November 2014

Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.

Priority

Medium

Status

Package Release Status
gnupg2
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was not-affected)
libksba
Launchpad, Ubuntu, Debian
Upstream
Released (1.3.2-1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [1.3.0-3ubuntu0.14.04.1])
Patches:
Upstream: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=f715b9e156dfa99ae829fc694e5a0abd23ef97d7