CVE-2012-6085

CVSS V2 Medium 5.8 CVSS V3 None
Description
The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.
Overview
  • CVE ID
  • CVE-2012-6085
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2013-01-24T01:55:03
  • Last Modified Date
  • 2023-02-13T04:37:54
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:1.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:1.4.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:1.4.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 4.9
History
Created Old Value New Value Data Type Notes
2022-05-10 08:47:29 Added to TrackCVE
2023-02-02 19:03:48 2023-02-02T18:16:57 CVE Modified Date updated
2023-02-02 19:03:48 The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet. CVE-2012-6085 GnuPG: read_block() corrupt key input validation Description updated
2023-02-02 19:03:55 References updated
2023-02-13 05:05:20 2023-02-13T04:37:54 CVE Modified Date updated
2023-02-13 05:05:20 CVE-2012-6085 GnuPG: read_block() corrupt key input validation The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet. Description updated