Home

Description

In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution.

PUBLISHED Reserved 2026-01-27 | Published 2026-01-27 | Updated 2026-01-27 | Assigner mitre




HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unaffected

2.5.13 (semver) before 2.5.17
affected

References

www.openwall.com/lists/oss-security/2026/01/27/8

dev.gnupg.org/T8044

cve.org (CVE-2026-24881)

nvd.nist.gov (CVE-2026-24881)

Download JSON