CVE-2006-6235

N/A Unknown
Published: December 07, 2006 Modified: April 23, 2026
View on NVD

Description

A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/23245
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/23250
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/23255
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/23269
Source: cve@mitre.org
Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/427009
Source: cve@mitre.org
US Government Resource
http://www.securityfocus.com/bid/21462
Source: cve@mitre.org
Vendor Advisory
http://www.ubuntu.com/usn/usn-393-1
Source: cve@mitre.org
Patch
http://secunia.com/advisories/23245
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/23250
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/23255
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/23259
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/23269
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/23284
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/23290
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/23299
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/23303
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/23329
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/23335
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/23513
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/24047
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200612-03.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1017349
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1231
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/427009
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:228
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2006_28_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0754.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/453664/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/453723/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/21462
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.trustix.org/errata/2006/0070
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-393-1
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.ubuntu.com/usn/usn-393-2
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/4881
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/30711
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-835
Source: af854a3a-2127-422b-91ae-364da2661108

70 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
8.9%
93th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

rpath slackware ubuntu gnu redhat gpg4win