#VU7658 Stack-based buffer overflow in Gnu - CVE-2017-5336
Published: August 2, 2017
Vulnerability identifier: #VU7658
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-5336
CWE-ID: CWE-121
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Gnu
Gnu
Software vendor:
GNU
GNU
Description
The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.
The weakness exists due to improper processing of malicious OpenPGP certificates by the cdk_pk_get_keyid function. A remote attacker can send a specially crafted OpenPGP certificate, trigger stack-based buffer overflow and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
The weakness exists due to improper processing of malicious OpenPGP certificates by the cdk_pk_get_keyid function. A remote attacker can send a specially crafted OpenPGP certificate, trigger stack-based buffer overflow and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
Remediation
Update to version 3.3.26 or 3.5.8.