SB2019112026 - Multiple vulnerabilities in GNU GnuPG
Published: November 20, 2019 Updated: July 17, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2015-1606)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing a crafted keyring file. A remote attackers can cause a denial of service (invalid read and use-after-free).
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
2) Input validation error (CVE-ID: CVE-2015-1607)
The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.
kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extensions and "memcpy with overlapping ranges."
Remediation
Install update from vendor's website.
References
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648
- http://www.debian.org/security/2015/dsa-3184
- http://www.openwall.com/lists/oss-security/2015/02/13/14
- http://www.openwall.com/lists/oss-security/2015/02/14/6
- http://www.securitytracker.com/id/1031876
- https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2183683bd633818dd031b090b5530951de76f392
- http://www.securityfocus.com/bid/72610
- http://www.ubuntu.com/usn/usn-2554-1/
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000361.html
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000362.html
- https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html