Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2006-6169

Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.025
EPSS Ranking 84.6%
CVSS Severity
CVSS v2 Score 6.8
References
Products affected by CVE-2006-6169
  • Gnupg » Gnupg » Version: 1.4
    cpe:2.3:a:gnupg:gnupg:1.4
  • Gnupg » Gnupg » Version: 2.0
    cpe:2.3:a:gnupg:gnupg:2.0


Contact Us

Shodan ® - All rights reserved