Home
HIGH: 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HDefault status
unaffected
2.5.13 (semver) before 2.5.17
affected
Description
In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.
Problem types
CWE-121 Stack-based Buffer Overflow
Product status
2.5.13 (semver) before 2.5.17
References
www.openwall.com/lists/oss-security/2026/01/27/8