|Category:||FreeBSD Local Security Checks|
|Title:||FreeBSD Ports: gnupg|
|Summary:||FreeBSD Ports: gnupg|
The remote host is missing an update to the system
as announced in the referenced advisory.
The following package is affected: gnupg
GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial
of service (crash) and possibly execute arbitrary code via crafted
duplicate keys that are imported from key servers, which triggers
'memory corruption around deduplication of user IDs.'
Update your system with the appropriate patches or
BugTraq ID: 28487|
Common Vulnerability Exposure (CVE) ID: CVE-2008-1530
XForce ISS Database: gnupg-keys-code-execution(41547)
|Copyright||Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com|
|This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.