Your submission was sent successfully! Close

CVE-2014-9087

Published: 26 November 2014

Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.

Notes

AuthorNote
mdeslaur
affects gnupg2 2.1 only
Priority

Medium

Status

Package Release Status
gnupg2
Launchpad, Ubuntu, Debian
lucid Not vulnerable

precise Not vulnerable

trusty Does not exist
(trusty was not-affected)
upstream Needs triage

utopic Not vulnerable

libksba
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise
Released (1.2.0-2ubuntu0.1)
trusty Does not exist
(trusty was released [1.3.0-3ubuntu0.14.04.1])
upstream
Released (1.3.2-1)
utopic
Released (1.3.0-3ubuntu0.14.10.1)
Patches:
upstream: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=f715b9e156dfa99ae829fc694e5a0abd23ef97d7