VYPR
Unrated severityNVD Advisory· Published Jun 19, 2006· Updated Apr 16, 2026

CVE-2006-3082

CVE-2006-3082

Description

parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.

Affected products

2
  • Gnupg/Gnupg2 versions
    cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*range: <=1.9.20
    • cpe:2.3:a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

33

News mentions

0

No linked articles in our index yet.