Buffer overflow - CVE-2020-25125

 

Buffer overflow - CVE-2020-25125

Published: September 3, 2020 / Updated: September 11, 2020


Vulnerability identifier: #VU46664
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2020-25125
CWE-ID: CWE-120
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Software vendor:

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version.


Remediation

Install update from vendor's website.

External links