Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-3746

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2006-3746
Last Modified 07 Mar 2011 09:39:23
Published 28 Jul 2006 05:04:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2006-3746

Summary

Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.

Vulnerable Systems

Application

  • Gnupg 1.4.4


References

MISC - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=200502

VUPEN - ADV-2006-3123

UBUNTU - USN-332-1

BID - 19110

REDHAT - RHSA-2006:0615

MLIST - [Gnupg-devel] 20060725 Re: [Dailydave] GnuPG 1.4.4 fun

MLIST - [Dailydave] 20060721 GnuPG 1.4.4 fun

XF - gnupg-parsecomment-bo(28220)

BUGTRAQ - 20060808 ERRATA: [ GLSA 200608-08 ] GnuPG: Integer overflow vulnerability

BUGTRAQ - 20060802 rPSA-2006-0143-1 gnupg

OSVDB - 27664

SUSE - SUSE-SR:2006:020

MANDRIVA - MDKSA-2006:141

DEBIAN - DSA-1141

DEBIAN - DSA-1140

CONFIRM - http://support.avaya.com/elmodocs2/security/ASA-2006-164.htm

SECTRACK - 1016622

GENTOO - GLSA-200608-08

SECUNIA - 21598

SECUNIA - 21524

SECUNIA - 21522

SECUNIA - 21467

SECUNIA - 21378

SECUNIA - 21351

SECUNIA - 21346

SECUNIA - 21333

SECUNIA - 21329

SECUNIA - 21326

SECUNIA - 21306

SECUNIA - 21300

SECUNIA - 21297

TRUSTIX - 2006-0044

MISC - http://issues.rpath.com/browse/RPL-560

MISC - http://bugs.debian.org/cgi-bin/bugreport.cgi/gnupg.CVE-2006-3746.diff?bug=381204;msg=15;att=1

SGI - 20060801-01-P

UBUNTU - USN-322-1


Last Updated: 27 May 2016 10:44:52