HIGH · 8.1

CVE-2010-2547

Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificat...

Vulnerability Description

Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.

CVSS Score

8.1

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
GnupgGnupg>= 2.0.0, <= 2.0.16
FedoraprojectFedora13
DebianDebian Linux5.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2010-2547?

CVE-2010-2547 is a vulnerability with a CVSS score of 8.1 (HIGH). Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificat...

How severe is CVE-2010-2547?

CVE-2010-2547 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2010-2547?

Check the references section above for vendor advisories and patch information. Affected products include: Gnupg Gnupg, Fedoraproject Fedora, Debian Debian Linux.