Summary
The remote host is missing updates announced in
advisory GLSA 200612-03.
Solution
All GnuPG users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '=app-crypt/gnupg-1.4*'
http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200612-03 http://bugs.gentoo.org/show_bug.cgi?id=156476
http://bugs.gentoo.org/show_bug.cgi?id=156947
Insight
GnuPG is vulnerable to a buffer overflow and an erroneous function pointer dereference that can result in the execution of arbitrary code.
Severity
Classification
-
CVE CVE-2006-6169, CVE-2006-6235 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities