CVE-2015-1606

The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 63%
VendorProductVersion
gnupggnupg
𝑥
< 2.1.2
debiandebian_linux
7.0
debiandebian_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gnupg2
bullseye (security)
2.2.27-2+deb11u2
fixed
bullseye
2.2.27-2+deb11u2
fixed
wheezy
no-dsa
squeeze
no-dsa
bookworm
2.2.40-1.1
fixed
trixie
2.2.44-1
fixed
sid
2.2.45-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gnupg
utopic
Fixed 1.4.16-1.2ubuntu1.2
released
trusty
Fixed 1.4.16-1ubuntu2.3
released
precise
Fixed 1.4.11-3ubuntu2.9
released
lucid
Fixed 1.4.10-2ubuntu1.8
released
gnupg2
utopic
Fixed 2.0.24-1ubuntu2.2
released
trusty
Fixed 2.0.22-3ubuntu1.3
released
precise
Fixed 2.0.17-2ubuntu2.12.04.6
released
lucid
ignored