Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2006:221: gnupg Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the gnupg package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2006:221 (gnupg).
Buffer overflow in the ask_outfile_name function in openfile.c for
GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow
attackers to execute arbitrary code via messages that cause the
make_printable_string function to return a longer string than expected
while constructing a prompt.
Updated packages have been patched to correct this issue.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:221
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.