VYPR
Unrated severityNVD Advisory· Published Nov 29, 2006· Updated Apr 23, 2026

CVE-2006-6169

CVE-2006-6169

Description

Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.

Affected products

2
  • Gnupg/Gnupg2 versions
    cpe:2.3:a:gnupg:gnupg:1.4:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:gnupg:gnupg:1.4:*:*:*:*:*:*:*
    • cpe:2.3:a:gnupg:gnupg:2.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

34

News mentions

0

No linked articles in our index yet.