Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
GnuPG 复制的Key输入拒绝服务攻击漏洞
Vulnerability Description
GnuPG (gpg) 1.4.8和2.0.8允许远程攻击者借助特制的复制的keys,引起拒绝服务攻击(崩溃)以及可能执行任意代码。该keys是从key服务器中引入的。它会触发"用户IDs的副本周围的内存破坏" 。
CVSS Information
N/A
Vulnerability Type
N/A