![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.702601 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-2601-1) |
Summary: | The remote host is missing an update for the Debian 'gnupg, gnupg2' package(s) announced via the DSA-2601-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'gnupg, gnupg2' package(s) announced via the DSA-2601-1 advisory. Vulnerability Insight: KB Sriram discovered that GnuPG, the GNU Privacy Guard did not sufficiently sanitise public keys on import, which could lead to memory and keyring corruption. The problem affects both version 1, in the gnupg package, and version two, in the gnupg2 package. For the stable distribution (squeeze), this problem has been fixed in version 1.4.10-4+squeeze1 of gnupg and version 2.0.14-2+squeeze1 of gnupg2. For the testing distribution (wheezy) and unstable distribution (sid), this problem has been fixed in version 1.4.12-7 of gnupg and version 2.0.19-2 of gnupg2. We recommend that you upgrade your gnupg and/or gnupg2 packages. Affected Software/OS: 'gnupg, gnupg2' package(s) on Debian 6. Solution: Please install the updated package(s). CVSS Score: 5.8 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-6085 57102 http://www.securityfocus.com/bid/57102 FEDORA-2013-0148 http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095513.html FEDORA-2013-0377 http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095516.html MDVSA-2013:001 http://www.mandriva.com/security/advisories?name=MDVSA-2013:001 RHSA-2013:1459 http://rhn.redhat.com/errata/RHSA-2013-1459.html USN-1682-1 http://www.ubuntu.com/usn/USN-1682-1 [oss-security] 20130101 Re: GnuPG 1.4.12 and lower - memory access errors and keyring database corruption http://www.openwall.com/lists/oss-security/2013/01/01/6 gnupg-public-keys-code-exec(80990) https://exchange.xforce.ibmcloud.com/vulnerabilities/80990 http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commitdiff%3Bh=f0b33b6fb8e0586e9584a7a409dcc31263776a67 https://bugs.g10code.com/gnupg/issue1455 https://bugzilla.redhat.com/show_bug.cgi?id=891142 |
Copyright | Copyright (C) 2013 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |