CVE-2006-6169

Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.

Date published : 2006-11-29

http://www.securityfocus.com/bid/21306

http://www.securityfocus.com/archive/1/452829/100/0/threaded