CVE-2014-9087

Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
Wrap or Wraparound
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
debianCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
VendorProductVersion
mageiamageia
3.0
mageiamageia
4.0
debiandebian_linux
7.0
debiandebian_linux
8.0
gnupglibksba
𝑥
< 1.3.2
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
14.10
gnupggnupg
2.1.0
gnupggnupg
2.1.0:beta1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gnupg2
bullseye (security)
2.2.27-2+deb11u2
fixed
bullseye
2.2.27-2+deb11u2
fixed
bookworm
2.2.40-1.1
fixed
trixie
2.2.44-1
fixed
sid
2.2.45-2
fixed
libksba
bullseye (security)
1.5.0-3+deb11u2
fixed
bullseye
1.5.0-3+deb11u2
fixed
bookworm
1.6.3-2
fixed
sid
1.6.7-2
fixed
trixie
1.6.7-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gnupg2
utopic
not-affected
trusty
dne
precise
not-affected
lucid
not-affected
libksba
utopic
Fixed 1.3.0-3ubuntu0.14.10.1
released
trusty
Fixed 1.3.0-3ubuntu0.14.04.1
released
precise
Fixed 1.2.0-2ubuntu0.1
released
lucid
ignored