kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extensions and "memcpy with overlapping ranges."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html | third party advisory |
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html | vendor advisory mailing list release notes |
http://www.openwall.com/lists/oss-security/2015/02/13/14 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2015/02/14/6 | third party advisory mailing list |
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000361.html | vendor advisory mailing list release notes |
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000362.html | vendor advisory mailing list release notes |
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=2183683bd633818dd031b090b5530951de76f392 | |
http://www.ubuntu.com/usn/usn-2554-1/ | third party advisory |
http://www.securityfocus.com/bid/72610 | third party advisory vdb entry |